0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff07000000000000006c0000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2619.106955] loop4: p4 start 1854537728 is beyond EOD, truncated [ 2619.197343] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 04:33:15 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0774000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:15 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2619.407273] loop5: p1 < > p4 [ 2619.411749] loop5: partition table partially beyond EOD, truncated [ 2619.442690] loop5: p1 size 2 extends beyond EOD, truncated [ 2619.489655] loop5: p4 start 1854537728 is beyond EOD, truncated [ 2619.583139] loop1: p1 < > p4 [ 2619.603201] loop4: p1 < > p4 [ 2619.610221] loop4: partition table partially beyond EOD, truncated [ 2619.619358] loop1: partition table partially beyond EOD, truncated [ 2619.626325] loop4: p1 size 2 extends beyond EOD, truncated 04:33:16 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff00000000, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2619.640535] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 2619.653807] loop4: p4 start 1854537728 is beyond EOD, truncated [ 2619.684186] loop1: p1 size 2 extends beyond EOD, truncated [ 2619.709205] loop1: p4 start 1854537728 is beyond EOD, truncated [ 2619.726644] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 04:33:16 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa60000004c8128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:16 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0774000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2619.843298] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 2620.101850] loop5: p1 < > p4 [ 2620.105629] loop5: partition table partially beyond EOD, truncated [ 2620.121534] loop5: p1 size 2 extends beyond EOD, truncated [ 2620.192636] loop4: p1 < > p4 [ 2620.197005] loop4: partition table partially beyond EOD, truncated [ 2620.205773] loop5: p4 start 1854537728 is beyond EOD, truncated [ 2620.231540] loop4: p1 size 2 extends beyond EOD, truncated [ 2620.254062] loop4: p4 start 1854537728 is beyond EOD, truncated [ 2620.325407] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 2620.357066] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 04:33:17 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:33:17 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000740000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:17 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfa03000000000000, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:33:17 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0774000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:17 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000548128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:17 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2621.303398] print_req_error: 23 callbacks suppressed [ 2621.303412] print_req_error: I/O error, dev loop4, sector 0 flags 80700 [ 2621.348264] print_req_error: I/O error, dev loop4, sector 0 flags 0 [ 2621.354789] buffer_io_error: 20 callbacks suppressed [ 2621.354802] Buffer I/O error on dev loop4p1, logical block 0, async page read [ 2621.368179] print_req_error: I/O error, dev loop4, sector 0 flags 0 [ 2621.374672] Buffer I/O error on dev loop4p1, logical block 0, async page read [ 2621.382577] print_req_error: I/O error, dev loop4, sector 0 flags 0 [ 2621.389086] Buffer I/O error on dev loop4p1, logical block 0, async page read [ 2621.433132] device team0 entered promiscuous mode 04:33:18 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0774000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2621.466207] device team_slave_0 entered promiscuous mode [ 2621.480250] device team_slave_1 entered promiscuous mode 04:33:18 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2621.562615] 8021q: adding VLAN 0 to HW filter on device team0 [ 2621.607439] loop5: p1 < > p4 [ 2621.610737] loop5: partition table partially beyond EOD, truncated 04:33:18 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:33:18 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff07000000000000007a0000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2621.679304] loop5: p1 size 2 extends beyond EOD, truncated [ 2621.705155] loop5: p4 start 1854537728 is beyond EOD, truncated 04:33:18 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0774000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2621.825180] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 2621.832411] device team0 left promiscuous mode [ 2621.859515] device team_slave_0 left promiscuous mode [ 2621.883605] device team_slave_1 left promiscuous mode 04:33:18 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:33:18 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:33:18 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000558128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2622.028925] device team0 entered promiscuous mode [ 2622.033899] device team_slave_0 entered promiscuous mode [ 2622.078828] device team_slave_1 entered promiscuous mode [ 2622.139827] loop4: p1 < > p4 [ 2622.143325] loop4: partition table partially beyond EOD, truncated [ 2622.172141] loop4: p1 size 2 extends beyond EOD, truncated [ 2622.183571] 8021q: adding VLAN 0 to HW filter on device team0 [ 2622.234382] loop4: p4 start 1854537728 is beyond EOD, truncated [ 2622.244876] loop1: p1 < > p4 [ 2622.269068] loop1: partition table partially beyond EOD, truncated 04:33:18 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:33:18 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:33:18 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2622.282528] loop1: p1 size 2 extends beyond EOD, truncated [ 2622.338601] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 2622.366175] loop1: p4 start 1854537728 is beyond EOD, truncated 04:33:19 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000578128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:19 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0774000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2622.409949] device team0 entered promiscuous mode [ 2622.440796] device team_slave_0 entered promiscuous mode [ 2622.469819] device team_slave_1 entered promiscuous mode [ 2622.530759] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 04:33:19 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2622.580032] 8021q: adding VLAN 0 to HW filter on device team0 [ 2622.628724] device team0 left promiscuous mode [ 2622.642310] device team_slave_0 left promiscuous mode 04:33:19 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:33:19 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000800000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2622.687908] device team_slave_1 left promiscuous mode 04:33:19 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000608128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:19 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0774000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:19 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2622.914974] loop1: p1 < > p4 [ 2622.942963] loop1: partition table partially beyond EOD, truncated [ 2622.956361] loop1: p1 size 2 extends beyond EOD, truncated [ 2622.968895] loop1: p4 start 1854537728 is beyond EOD, truncated [ 2622.990130] print_req_error: I/O error, dev loop5, sector 0 flags 80700 [ 2623.003491] print_req_error: I/O error, dev loop5, sector 0 flags 0 [ 2623.010033] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 2623.018142] print_req_error: I/O error, dev loop5, sector 0 flags 0 [ 2623.024699] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 2623.032550] print_req_error: I/O error, dev loop5, sector 0 flags 0 04:33:19 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2623.039130] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 2623.056447] print_req_error: I/O error, dev loop5, sector 0 flags 0 [ 2623.063043] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 2623.070696] print_req_error: I/O error, dev loop5, sector 0 flags 0 [ 2623.077287] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 2623.085071] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 2623.099699] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 2623.147251] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 2623.206571] loop_reread_partitions: partition scan of loop5 () failed (rc=-16) [ 2623.319751] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 04:33:21 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:33:21 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0774000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:21 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000ffffff810000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:21 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:33:21 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000638128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:21 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2625.120381] device team0 entered promiscuous mode [ 2625.127257] device team_slave_0 entered promiscuous mode [ 2625.133289] device team_slave_1 entered promiscuous mode 04:33:21 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2625.176505] 8021q: adding VLAN 0 to HW filter on device team0 04:33:21 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:33:21 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2625.301479] loop4: p1 < > p4 [ 2625.308045] loop4: partition table partially beyond EOD, truncated [ 2625.314590] loop4: p1 size 2 extends beyond EOD, truncated [ 2625.322456] loop4: p4 start 1854537728 is beyond EOD, truncated 04:33:21 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2625.371495] loop1: p1 < > p4 [ 2625.381909] loop1: partition table partially beyond EOD, truncated [ 2625.417766] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 2625.422442] loop5: p1 < > p4 [ 2625.431715] device team0 left promiscuous mode [ 2625.446257] loop5: partition table partially beyond EOD, truncated [ 2625.452779] device team_slave_0 left promiscuous mode [ 2625.460223] loop1: p1 size 2 extends beyond EOD, truncated 04:33:22 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:33:22 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0774000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2625.472906] device team_slave_1 left promiscuous mode [ 2625.480784] loop5: p1 size 2 extends beyond EOD, truncated [ 2625.509556] loop1: p4 start 1854537728 is beyond EOD, truncated 04:33:22 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2625.542592] loop5: p4 start 1854537728 is beyond EOD, truncated 04:33:22 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2625.747605] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 2625.766834] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 2625.830878] loop4: p1 < > p4 [ 2625.834298] loop4: partition table partially beyond EOD, truncated [ 2625.891806] loop4: p1 size 2 extends beyond EOD, truncated [ 2625.932833] loop4: p4 start 1854537728 is beyond EOD, truncated 04:33:22 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000ffffff820000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:22 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:33:22 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:33:22 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:33:22 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000688128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2626.033767] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 2626.067057] device team0 entered promiscuous mode 04:33:22 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0774000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2626.082256] device team_slave_0 entered promiscuous mode [ 2626.102118] device team_slave_1 entered promiscuous mode [ 2626.124241] 8021q: adding VLAN 0 to HW filter on device team0 04:33:22 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2626.139937] device team0 left promiscuous mode [ 2626.144571] device team_slave_0 left promiscuous mode [ 2626.145646] device team_slave_1 left promiscuous mode 04:33:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100)}}, 0x18) sendmsg$inet_sctp(r0, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:33:22 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2626.358820] loop5: p1 < > p4 [ 2626.362270] loop5: partition table partially beyond EOD, truncated [ 2626.411726] device team0 left promiscuous mode 04:33:23 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2626.448787] loop5: p1 size 2 extends beyond EOD, truncated [ 2626.454346] device team_slave_0 left promiscuous mode [ 2626.467592] device team_slave_1 left promiscuous mode [ 2626.487768] loop1: p1 < > p4 04:33:23 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0774000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2626.521877] loop1: partition table partially beyond EOD, truncated [ 2626.550028] loop5: p4 start 1854537728 is beyond EOD, truncated [ 2626.576506] loop1: p1 size 2 extends beyond EOD, truncated 04:33:23 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x66, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2626.629490] loop1: p4 start 1854537728 is beyond EOD, truncated [ 2626.662737] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 2626.792767] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 2626.850814] loop4: p1 < > p4 [ 2626.884475] loop4: partition table partially beyond EOD, truncated [ 2626.929415] loop4: p1 size 2 extends beyond EOD, truncated [ 2626.951741] loop4: p4 start 1854537728 is beyond EOD, truncated 04:33:23 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000ffffff970000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:23 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:33:23 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa60000006c8128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2627.071828] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 04:33:23 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2627.250949] loop5: p1 < > p4 04:33:23 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6e, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2627.273252] loop5: partition table partially beyond EOD, truncated [ 2627.305818] loop5: p1 size 2 extends beyond EOD, [ 2627.317838] truncated 04:33:23 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000ffffffa50000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2627.374283] loop5: p4 start 1854537728 is beyond EOD, truncated [ 2627.435736] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 04:33:24 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e8, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2627.510604] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 2627.677951] loop1: p1 < > p4 [ 2627.706761] loop1: partition table partially beyond EOD, truncated [ 2627.754939] loop1: p1 size 2 extends beyond EOD, truncated [ 2627.794261] loop1: p4 start 1854537728 is beyond EOD, truncated [ 2627.923223] print_req_error: 27 callbacks suppressed [ 2627.923234] print_req_error: I/O error, dev loop1, sector 0 flags 80700 [ 2627.935534] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 2627.963934] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 2627.970452] buffer_io_error: 23 callbacks suppressed [ 2627.970463] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 2627.975805] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 2627.989990] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 2627.997788] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 2628.004253] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 2628.012258] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 2628.018783] Buffer I/O error on dev loop1p1, logical block 0, async page read 04:33:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100)}}, 0x18) sendmsg$inet_sctp(r0, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:33:25 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:25 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000748128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:25 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x226, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:33:25 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000ffffffa60000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:25 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:33:25 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2628.743222] device team0 entered promiscuous mode [ 2628.759115] device team_slave_0 entered promiscuous mode [ 2628.776978] device team_slave_1 entered promiscuous mode [ 2628.813571] 8021q: adding VLAN 0 to HW filter on device team0 04:33:25 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2629.082530] loop5: p1 < > p4 [ 2629.086065] loop5: partition table partially beyond EOD, truncated [ 2629.094688] loop5: p1 size 2 extends beyond EOD, truncated [ 2629.094809] loop1: p1 < > p4 [ 2629.122685] loop1: partition table partially beyond EOD, truncated [ 2629.153092] device team0 left promiscuous mode [ 2629.173656] loop5: p4 start 1854537728 is beyond EOD, truncated [ 2629.181800] loop1: p1 size 2 extends beyond EOD, truncated [ 2629.188892] device team_slave_0 left promiscuous mode [ 2629.208449] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 04:33:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100)}}, 0x18) sendmsg$inet_sctp(r0, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2629.221919] device team_slave_1 left promiscuous mode 04:33:25 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a4, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2629.274790] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 04:33:25 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2629.319080] loop1: p4 start 1854537728 is beyond EOD, truncated [ 2629.358170] device team0 entered promiscuous mode 04:33:26 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa60000007a8128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2629.419504] device team_slave_0 entered promiscuous mode [ 2629.444386] device team_slave_1 entered promiscuous mode 04:33:26 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2629.502901] 8021q: adding VLAN 0 to HW filter on device team0 [ 2629.537754] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 04:33:26 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:26 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:33:26 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000ffffffa90000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:26 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:33:26 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2629.774773] device team0 entered promiscuous mode [ 2629.795997] device team_slave_0 entered promiscuous mode [ 2629.801800] device team_slave_1 entered promiscuous mode [ 2629.838191] loop5: p1 < > p4 [ 2629.841404] loop5: partition table partially beyond EOD, truncated [ 2629.876484] 8021q: adding VLAN 0 to HW filter on device team0 [ 2629.887732] loop5: p1 size 2 extends beyond EOD, truncated [ 2629.927718] loop5: p4 start 1854537728 is beyond EOD, truncated 04:33:26 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:33:26 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3dc, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2630.000283] device team0 left promiscuous mode [ 2630.014558] device team_slave_0 left promiscuous mode [ 2630.025064] device team_slave_1 left promiscuous mode [ 2630.043290] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 2630.095069] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 2630.186728] loop1: p1 < > p4 [ 2630.196336] loop1: partition table partially beyond EOD, truncated 04:33:26 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:26 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000002888128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2630.227331] loop1: p1 size 2 extends beyond EOD, truncated 04:33:26 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2630.289209] loop1: p4 start 1854537728 is beyond EOD, truncated 04:33:27 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fa, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2630.400557] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 2630.501183] device team0 left promiscuous mode [ 2630.506770] device team_slave_0 left promiscuous mode [ 2630.523390] device team_slave_1 left promiscuous mode 04:33:27 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000ffffffbf0000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2630.588838] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 04:33:27 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:33:27 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2630.697861] loop5: p1 < > p4 [ 2630.701270] loop5: partition table partially beyond EOD, truncated 04:33:27 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2630.776740] loop5: p1 size 2 extends beyond EOD, truncated [ 2630.829523] loop5: p4 start 1854537728 is beyond EOD, truncated [ 2630.836310] device team0 entered promiscuous mode 04:33:27 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:33:27 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2630.883518] device team_slave_0 entered promiscuous mode [ 2630.909208] device team_slave_1 entered promiscuous mode [ 2630.924262] 8021q: adding VLAN 0 to HW filter on device team0 04:33:27 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:33:27 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2631.069067] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 2631.091214] loop1: p1 < > p4 [ 2631.100184] loop1: partition table partially beyond EOD, truncated [ 2631.111453] loop1: p1 size 2 extends beyond EOD, truncated [ 2631.121961] device team0 entered promiscuous mode [ 2631.142458] device team_slave_0 entered promiscuous mode [ 2631.150019] loop1: p4 start 1854537728 is beyond EOD, truncated [ 2631.152041] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 2631.187621] device team_slave_1 entered promiscuous mode 04:33:27 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:27 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000003a08128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2631.249875] 8021q: adding VLAN 0 to HW filter on device team0 04:33:27 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2631.299374] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 2631.307554] device team0 left promiscuous mode [ 2631.332850] device team_slave_0 left promiscuous mode 04:33:27 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2631.354189] device team_slave_1 left promiscuous mode 04:33:28 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000ffffffc90000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2631.496429] print_req_error: I/O error, dev loop5, sector 0 flags 80700 [ 2631.503410] print_req_error: I/O error, dev loop5, sector 0 flags 0 [ 2631.509955] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 2631.527160] print_req_error: I/O error, dev loop5, sector 0 flags 0 [ 2631.533702] Buffer I/O error on dev loop5p1, logical block 0, async page read 04:33:28 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:33:28 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000002b08128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2631.673799] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 04:33:28 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:28 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:33:28 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000ffffffee0000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:28 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:33:28 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000003ff8128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:28 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2200, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2631.971594] device team0 left promiscuous mode [ 2631.978049] device team_slave_0 left promiscuous mode [ 2631.985260] device team_slave_1 left promiscuous mode 04:33:28 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2632.224102] device team0 entered promiscuous mode [ 2632.236253] loop1: p1 < > p4 [ 2632.244669] loop1: partition table partially beyond EOD, truncated [ 2632.254201] device team_slave_0 entered promiscuous mode [ 2632.255496] loop1: p1 size 2 extends beyond EOD, truncated [ 2632.266245] device team_slave_1 entered promiscuous mode 04:33:28 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2602, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2632.298173] loop1: p4 start 1854537728 is beyond EOD, truncated [ 2632.306388] 8021q: adding VLAN 0 to HW filter on device team0 [ 2632.369308] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 2632.391181] loop5: p1 < > p4 [ 2632.394811] loop5: partition table partially beyond EOD, truncated 04:33:29 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:33:29 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2632.424283] loop5: p1 size 2 extends beyond EOD, truncated [ 2632.434283] device team0 entered promiscuous mode [ 2632.454779] device team_slave_0 entered promiscuous mode [ 2632.464120] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 04:33:29 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3400, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2632.498533] device team_slave_1 entered promiscuous mode [ 2632.507522] loop5: p4 start 1854537728 is beyond EOD, truncated [ 2632.579765] 8021q: adding VLAN 0 to HW filter on device team0 [ 2632.619101] device team0 left promiscuous mode 04:33:29 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2632.646152] device team_slave_0 left promiscuous mode [ 2632.652642] device team_slave_1 left promiscuous mode [ 2632.698894] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 04:33:29 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:33:29 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000fffffff50000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2632.739387] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 04:33:29 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:29 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa600000fff8128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:29 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2632.964264] loop1: p1 < > p4 [ 2632.989416] loop1: partition table partially beyond EOD, truncated [ 2633.032014] loop1: p1 size 2 extends beyond EOD, truncated [ 2633.052747] device team0 left promiscuous mode [ 2633.059774] device team_slave_0 left promiscuous mode [ 2633.065209] device team_slave_1 left promiscuous mode 04:33:29 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6600, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2633.140904] loop1: p4 start 1854537728 is beyond EOD, truncated [ 2633.180518] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 04:33:29 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:33:29 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2633.263665] loop5: p1 < > p4 [ 2633.278275] loop5: partition table partially beyond EOD, truncated [ 2633.301316] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 04:33:29 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2633.319921] loop5: p1 size 2 extends beyond EOD, truncated [ 2633.333677] loop5: p4 start 1854537728 is beyond EOD, truncated [ 2633.369128] device team0 entered promiscuous mode 04:33:30 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2633.394472] device team_slave_0 entered promiscuous mode 04:33:30 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000fffffffd0000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2633.445771] device team_slave_1 entered promiscuous mode [ 2633.467430] 8021q: adding VLAN 0 to HW filter on device team0 04:33:30 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:33:30 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6e00, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:33:30 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2633.563124] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 2633.621566] device team0 entered promiscuous mode [ 2633.633493] device team_slave_0 entered promiscuous mode [ 2633.642116] device team_slave_1 entered promiscuous mode [ 2633.655733] 8021q: adding VLAN 0 to HW filter on device team0 [ 2633.684150] device team0 left promiscuous mode [ 2633.688803] device team_slave_0 left promiscuous mode [ 2633.688939] device team_slave_1 left promiscuous mode 04:33:30 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa403, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:33:30 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000028128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100)}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r0, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2633.765789] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 04:33:30 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2633.881638] loop1: p1 < > p4 [ 2633.891249] loop1: partition table partially beyond EOD, truncated 04:33:30 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc003, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2633.965724] loop1: p1 size 2 extends beyond EOD, truncated [ 2633.991777] device team0 left promiscuous mode [ 2633.998509] device team_slave_0 left promiscuous mode [ 2634.015653] device team_slave_1 left promiscuous mode [ 2634.036632] loop1: p4 start 1854537728 is beyond EOD, truncated 04:33:30 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2634.111708] loop5: p1 < > p4 [ 2634.145612] loop5: partition table partially beyond EOD, truncated [ 2634.159358] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 04:33:30 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff070000000000000fff0000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2634.199049] loop5: p1 size 2 extends beyond EOD, truncated 04:33:30 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd003, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2634.252242] loop5: p4 start 1854537728 is beyond EOD, truncated [ 2634.269652] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 2634.292615] device team0 entered promiscuous mode 04:33:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100)}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r0, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:33:30 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2634.325067] device team_slave_0 entered promiscuous mode [ 2634.350492] device team_slave_1 entered promiscuous mode 04:33:31 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdc03, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2634.412099] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 2634.418830] 8021q: adding VLAN 0 to HW filter on device team0 [ 2634.473219] print_req_error: I/O error, dev loop1, sector 0 flags 80700 [ 2634.486180] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 2634.492642] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 2634.506503] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 2634.510894] device team0 entered promiscuous mode [ 2634.512964] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 2634.513140] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 2634.522626] device team_slave_0 entered promiscuous mode [ 2634.525384] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 2634.526067] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 2634.551160] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 2634.558997] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 2634.565458] Buffer I/O error on dev loop1p1, logical block 0, async page read 04:33:31 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000038128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:31 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2634.568144] device team_slave_1 entered promiscuous mode [ 2634.573365] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 2634.584785] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 2634.592514] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 2634.598993] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 2634.609552] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 2634.616073] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 2634.662691] 8021q: adding VLAN 0 to HW filter on device team0 [ 2634.711395] device team0 left promiscuous mode [ 2634.731166] device team_slave_0 left promiscuous mode [ 2634.742176] device team_slave_1 left promiscuous mode 04:33:31 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe801, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:33:31 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x0, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100)}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r0, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2634.811462] loop1: p1 < > p4 [ 2634.817812] loop1: partition table partially beyond EOD, truncated [ 2634.827942] loop1: p1 size 2 extends beyond EOD, truncated [ 2634.887560] loop5: p1 < > p4 [ 2634.906807] loop5: partition table partially beyond EOD, truncated [ 2634.926714] loop1: p4 start 1854537728 is beyond EOD, truncated [ 2634.940948] loop5: p1 size 2 extends beyond EOD, truncated 04:33:31 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf003, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2635.001443] loop5: p4 start 1854537728 is beyond EOD, truncated [ 2635.060680] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 04:33:31 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfa03, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2635.109437] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 2635.139004] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 04:33:31 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:31 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000048128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2635.291197] device team0 left promiscuous mode [ 2635.297950] device team_slave_0 left promiscuous mode [ 2635.305427] device team_slave_1 left promiscuous mode 04:33:31 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:32 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:33:32 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2635.649274] loop5: p1 < > p4 [ 2635.667938] loop5: partition table partially beyond EOD, truncated 04:33:32 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2635.702755] loop5: p1 size 2 extends beyond EOD, truncated 04:33:32 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2635.750227] loop1: p1 < > p4 [ 2635.775174] loop1: partition table partially beyond EOD, truncated [ 2635.796069] loop5: p4 start 1854537728 is beyond EOD, truncated [ 2635.805144] device team0 entered promiscuous mode [ 2635.810713] device team_slave_0 entered promiscuous mode [ 2635.819225] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 2635.820139] loop1: p1 size 2 extends beyond EOD, truncated [ 2635.853569] device team_slave_1 entered promiscuous mode 04:33:32 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:33:32 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2635.923095] 8021q: adding VLAN 0 to HW filter on device team0 [ 2635.931358] loop1: p4 start 1854537728 is beyond EOD, truncated 04:33:32 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:33:32 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2635.989482] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 2636.049062] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 2636.093659] device team0 entered promiscuous mode 04:33:32 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2636.144122] device team_slave_0 entered promiscuous mode [ 2636.161947] device team_slave_1 entered promiscuous mode [ 2636.177467] 8021q: adding VLAN 0 to HW filter on device team0 [ 2636.192084] device team0 left promiscuous mode [ 2636.202260] device team_slave_0 left promiscuous mode [ 2636.244023] device team_slave_1 left promiscuous mode [ 2636.278353] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 04:33:32 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700020000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:32 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:33:32 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000058128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:33 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:33 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2636.723764] loop5: p1 < > p4 [ 2636.740088] loop5: partition table partially beyond EOD, truncated 04:33:33 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2636.770452] loop5: p1 size 2 extends beyond EOD, truncated [ 2636.812859] loop5: p4 start 1854537728 is beyond EOD, truncated [ 2636.888761] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 2636.911415] loop1: p1 < > p4 [ 2636.919592] loop1: partition table partially beyond EOD, truncated [ 2636.942386] loop1: p1 size 2 extends beyond EOD, truncated [ 2636.953636] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 04:33:33 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2637.014931] loop1: p4 start 1854537728 is beyond EOD, truncated 04:33:33 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000068128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:33 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2637.113100] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 2637.272917] print_req_error: I/O error, dev loop1, sector 0 flags 80700 [ 2637.286006] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 2637.293538] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 2637.328339] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 2637.390466] loop5: p1 < > p4 [ 2637.401277] loop5: partition table partially beyond EOD, truncated [ 2637.430068] loop5: p1 size 2 extends beyond EOD, truncated [ 2637.460709] loop5: p4 start 1854537728 is beyond EOD, truncated [ 2637.556756] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 2637.716705] loop5: p1 < > p4 [ 2637.719947] loop5: partition table partially beyond EOD, truncated [ 2637.782203] loop5: p1 size 2 extends beyond EOD, truncated [ 2637.818452] loop5: p4 start 1854537728 is beyond EOD, truncated [ 2637.966794] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 2638.313139] device team0 left promiscuous mode [ 2638.319101] device team_slave_0 left promiscuous mode [ 2638.340576] device team_slave_1 left promiscuous mode 04:33:35 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:33:35 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:33:35 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:35 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000078128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:35 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700030000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:35 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2638.704777] device team0 entered promiscuous mode 04:33:35 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2638.756492] device team_slave_0 entered promiscuous mode [ 2638.780919] loop1: p1 < > p4 [ 2638.784970] device team_slave_1 entered promiscuous mode [ 2638.795228] loop1: partition table partially beyond EOD, truncated [ 2638.817946] loop1: p1 size 2 extends beyond EOD, truncated [ 2638.834238] 8021q: adding VLAN 0 to HW filter on device team0 [ 2638.913830] loop5: p1 < > p4 [ 2638.925289] loop5: partition table partially beyond EOD, truncated [ 2638.929713] loop1: p4 start 1854537728 is beyond EOD, truncated 04:33:35 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2638.972620] loop5: p1 size 2 extends beyond EOD, truncated 04:33:35 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:33:35 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:33:35 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2639.034486] loop5: p4 start 1854537728 is beyond EOD, truncated [ 2639.112674] device team0 left promiscuous mode [ 2639.132026] device team_slave_0 left promiscuous mode [ 2639.138896] device team_slave_1 left promiscuous mode [ 2639.157071] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 2639.165400] device team0 entered promiscuous mode [ 2639.172622] device team_slave_0 entered promiscuous mode [ 2639.191609] device team_slave_1 entered promiscuous mode [ 2639.223715] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 2639.270075] 8021q: adding VLAN 0 to HW filter on device team0 04:33:35 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2639.486681] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 2639.499792] print_req_error: 21 callbacks suppressed [ 2639.499803] print_req_error: I/O error, dev loop1, sector 0 flags 80700 04:33:36 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700040000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:36 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:33:36 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:33:36 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000088128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:36 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2639.568575] device team0 entered promiscuous mode [ 2639.595818] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 2639.602435] buffer_io_error: 18 callbacks suppressed [ 2639.602444] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 2639.605914] device team_slave_0 entered promiscuous mode [ 2639.607882] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 2639.615504] device team_slave_1 entered promiscuous mode [ 2639.620792] Buffer I/O error on dev loop1p1, logical block 0, async page read 04:33:36 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2639.640148] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 2639.646747] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 2639.677660] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 2639.684163] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 2639.691769] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 2639.698342] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 2639.698500] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 2639.706924] 8021q: adding VLAN 0 to HW filter on device team0 [ 2639.712194] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 2639.725585] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 2639.732374] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 2639.740105] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 2639.747129] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 2639.747261] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 2639.761113] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 2639.768697] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 2639.782400] device team0 left promiscuous mode 04:33:36 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:33:36 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2639.846999] device team_slave_0 left promiscuous mode [ 2639.869923] device team_slave_1 left promiscuous mode [ 2639.987047] loop5: p1 < > p4 [ 2640.004653] loop5: partition table partially beyond EOD, truncated [ 2640.054578] loop5: p1 size 2 extends beyond EOD, truncated 04:33:36 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2640.111403] loop5: p4 start 1854537728 is beyond EOD, truncated 04:33:36 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700050000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2640.190824] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 2640.250002] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 04:33:36 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:36 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:33:37 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000098128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2640.509001] loop1: p1 < > p4 [ 2640.527926] loop1: partition table partially beyond EOD, truncated 04:33:37 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2640.582551] loop1: p1 size 2 extends beyond EOD, truncated [ 2640.642701] loop1: p4 start 1854537728 is beyond EOD, truncated [ 2640.689905] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 2640.782040] loop5: p1 < > p4 [ 2640.796959] loop5: partition table partially beyond EOD, truncated [ 2640.810840] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 2640.853445] loop5: p1 size 2 extends beyond EOD, truncated [ 2640.920689] loop5: p4 start 1854537728 is beyond EOD, truncated [ 2641.024809] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 2642.052557] device team0 left promiscuous mode [ 2642.057313] device team_slave_0 left promiscuous mode [ 2642.069476] device team_slave_1 left promiscuous mode 04:33:39 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:33:39 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:39 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700060000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:39 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22000000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:33:39 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa60000000f8128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:39 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2642.545447] device team0 entered promiscuous mode [ 2642.561512] device team_slave_0 entered promiscuous mode [ 2642.568124] device team_slave_1 entered promiscuous mode [ 2642.595502] 8021q: adding VLAN 0 to HW filter on device team0 [ 2642.618372] device team0 entered promiscuous mode [ 2642.623590] device team_slave_0 entered promiscuous mode 04:33:39 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x26020000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2642.653303] device team_slave_1 entered promiscuous mode 04:33:39 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2642.750736] loop1: p1 < > p4 [ 2642.774626] loop1: partition table partially beyond EOD, truncated [ 2642.793559] 8021q: adding VLAN 0 to HW filter on device team0 [ 2642.830799] loop1: p1 size 2 extends beyond EOD, truncated [ 2642.869307] loop1: p4 start 1854537728 is beyond EOD, truncated 04:33:39 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000238128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2642.885368] device team0 left promiscuous mode [ 2642.900990] device team_slave_0 left promiscuous mode [ 2642.919269] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 04:33:39 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:33:39 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2642.946308] device team_slave_1 left promiscuous mode 04:33:39 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2643.004146] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 04:33:39 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2643.104482] loop5: p1 < > p4 [ 2643.115767] device team0 left promiscuous mode [ 2643.121980] loop5: partition table partially beyond EOD, truncated [ 2643.142153] device team_slave_0 left promiscuous mode 04:33:39 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:33:39 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700070000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2643.190043] loop5: p1 size 2 extends beyond EOD, truncated [ 2643.190712] device team_slave_1 left promiscuous mode [ 2643.252811] loop5: p4 start 1854537728 is beyond EOD, truncated 04:33:40 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2643.460694] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 2643.501493] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 04:33:40 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2643.603288] loop1: p1 < > p4 [ 2643.623019] loop1: partition table partially beyond EOD, truncated [ 2643.635437] loop1: p1 size 2 extends beyond EOD, truncated 04:33:40 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000428128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2643.688952] loop1: p4 start 1854537728 is beyond EOD, truncated 04:33:40 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x66000000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:33:40 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2643.880789] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 04:33:40 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:33:40 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2644.061106] device team0 entered promiscuous mode [ 2644.082552] device team_slave_0 entered promiscuous mode [ 2644.089065] device team_slave_1 entered promiscuous mode [ 2644.104506] 8021q: adding VLAN 0 to HW filter on device team0 04:33:40 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700090000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2644.143836] loop5: p1 < > p4 [ 2644.150256] loop5: partition table partially beyond EOD, truncated [ 2644.176447] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 04:33:40 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:33:40 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6e000000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:33:40 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2644.217430] loop5: p1 size 2 extends beyond EOD, truncated [ 2644.236923] loop5: p4 start 1854537728 is beyond EOD, truncated [ 2644.246153] device team0 entered promiscuous mode [ 2644.251153] device team_slave_0 entered promiscuous mode [ 2644.290677] device team_slave_1 entered promiscuous mode 04:33:40 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000488128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2644.351672] 8021q: adding VLAN 0 to HW filter on device team0 [ 2644.394829] loop1: p1 < > p4 [ 2644.409681] loop1: partition table partially beyond EOD, truncated 04:33:41 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:41 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2644.440855] loop1: p1 size 2 extends beyond EOD, truncated [ 2644.451322] device team0 left promiscuous mode [ 2644.461193] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 2644.476295] device team_slave_0 left promiscuous mode 04:33:41 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2644.511723] loop1: p4 start 1854537728 is beyond EOD, truncated [ 2644.512492] device team_slave_1 left promiscuous mode [ 2644.679773] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 04:33:41 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4030000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:33:41 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa60000004c8128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2644.850206] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 04:33:41 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc0030000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:33:41 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:41 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff07000f0000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2645.027072] loop5: p1 < > p4 [ 2645.060853] loop5: partition table partially beyond EOD, truncated [ 2645.113094] loop5: p1 size 2 extends beyond EOD, truncated [ 2645.196926] loop5: p4 start 1854537728 is beyond EOD, truncated [ 2645.268810] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 2645.387732] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 04:33:42 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, 0x0, 0x0) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:33:42 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0030000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:33:42 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2645.428902] device team0 left promiscuous mode [ 2645.433572] device team_slave_0 left promiscuous mode [ 2645.443052] device team_slave_1 left promiscuous mode [ 2645.469041] loop1: p1 < > p4 [ 2645.472331] loop1: partition table partially beyond EOD, truncated 04:33:42 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000548128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2645.550754] loop1: p1 size 2 extends beyond EOD, truncated 04:33:42 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdc030000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2645.612036] loop1: p4 start 1854537728 is beyond EOD, truncated [ 2645.629612] device team0 entered promiscuous mode [ 2645.676268] device team_slave_0 entered promiscuous mode [ 2645.698079] device team_slave_1 entered promiscuous mode 04:33:42 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2645.803211] 8021q: adding VLAN 0 to HW filter on device team0 04:33:42 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, 0x0, 0x0) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2645.902356] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 04:33:42 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8010000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2645.961071] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 2645.989774] loop5: p1 < > p4 [ 2645.999181] loop5: partition table partially beyond EOD, truncated 04:33:42 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:42 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700100000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2646.017966] loop5: p1 size 2 extends beyond EOD, truncated [ 2646.091766] loop5: p4 start 1854537728 is beyond EOD, truncated [ 2646.105432] device team0 entered promiscuous mode [ 2646.115724] device team_slave_0 entered promiscuous mode [ 2646.136993] device team_slave_1 entered promiscuous mode 04:33:42 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0030000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2646.241998] 8021q: adding VLAN 0 to HW filter on device team0 [ 2646.275773] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 2646.301397] device team0 left promiscuous mode [ 2646.312630] device team_slave_0 left promiscuous mode 04:33:42 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2646.360953] device team_slave_1 left promiscuous mode 04:33:43 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:33:43 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000558128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2646.533392] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 04:33:43 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700230000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:43 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:43 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2646.798669] loop5: p1 < > p4 [ 2646.820545] loop5: partition table partially beyond EOD, truncated 04:33:43 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfa030000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2646.864050] loop5: p1 size 2 extends beyond EOD, truncated [ 2646.897139] loop5: p4 start 1854537728 is beyond EOD, truncated [ 2647.035717] loop1: p1 < > p4 [ 2647.053481] loop1: partition table partially beyond EOD, truncated [ 2647.064345] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 2647.092152] loop1: p1 size 2 extends beyond EOD, truncated [ 2647.129505] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 2647.155599] loop1: p4 start 1854537728 is beyond EOD, truncated [ 2647.303318] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 2647.529240] print_req_error: 12 callbacks suppressed [ 2647.529252] print_req_error: I/O error, dev loop5, sector 0 flags 80700 [ 2647.561225] print_req_error: I/O error, dev loop5, sector 0 flags 0 [ 2647.567811] buffer_io_error: 10 callbacks suppressed [ 2647.567821] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 2647.580517] print_req_error: I/O error, dev loop5, sector 0 flags 0 [ 2647.587287] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 2647.606261] print_req_error: I/O error, dev loop5, sector 0 flags 0 [ 2647.612695] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 2647.620216] print_req_error: I/O error, dev loop5, sector 0 flags 0 [ 2647.626692] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 2647.634110] print_req_error: I/O error, dev loop5, sector 0 flags 0 [ 2647.640614] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 2647.648142] print_req_error: I/O error, dev loop5, sector 0 flags 0 [ 2647.654561] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 2647.662083] print_req_error: I/O error, dev loop5, sector 0 flags 0 [ 2647.668544] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 2647.676365] print_req_error: I/O error, dev loop5, sector 0 flags 0 [ 2647.682788] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 2647.690484] print_req_error: I/O error, dev loop5, sector 0 flags 0 [ 2647.696962] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 2647.704671] Buffer I/O error on dev loop5p1, logical block 0, async page read 04:33:44 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, 0x0, 0x0) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:33:44 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff8000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:33:44 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000578128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:44 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:44 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700420000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2648.296808] device team0 left promiscuous mode [ 2648.301535] device team_slave_0 left promiscuous mode [ 2648.323587] device team_slave_1 left promiscuous mode 04:33:45 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2648.505708] device team0 entered promiscuous mode [ 2648.523890] device team_slave_0 entered promiscuous mode [ 2648.563254] device team_slave_1 entered promiscuous mode [ 2648.657478] 8021q: adding VLAN 0 to HW filter on device team0 [ 2648.676730] loop1: p1 < > p4 [ 2648.694432] loop1: partition table partially beyond EOD, truncated [ 2648.751679] loop1: p1 size 2 extends beyond EOD, truncated [ 2648.788754] loop_reread_partitions: partition scan of loop5 () failed (rc=-16) [ 2648.875748] loop1: p4 start 1854537728 is beyond EOD, truncated [ 2648.888009] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 04:33:45 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:33:45 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x0, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:33:45 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8c, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:33:45 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2649.044679] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 2649.109464] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 04:33:45 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff5, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:33:45 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000608128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:45 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x0, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2649.233636] device team0 entered promiscuous mode [ 2649.240406] device team_slave_0 entered promiscuous mode [ 2649.266129] device team_slave_1 entered promiscuous mode [ 2649.305511] 8021q: adding VLAN 0 to HW filter on device team0 04:33:46 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700480000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:46 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2649.459085] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 04:33:46 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff6, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:33:46 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0x0, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2649.595433] device team0 left promiscuous mode [ 2649.619999] loop5: p1 < > p4 [ 2649.632024] loop5: partition table partially beyond EOD, truncated [ 2649.638913] device team_slave_0 left promiscuous mode 04:33:46 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x0, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2649.660220] device team_slave_1 left promiscuous mode [ 2649.682176] loop5: p1 size 2 extends beyond EOD, truncated [ 2649.739644] loop1: p1 < > p4 [ 2649.758361] loop1: partition table partially beyond EOD, truncated [ 2649.758963] loop5: p4 start 1854537728 is beyond EOD, truncated 04:33:46 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2649.791207] loop1: p1 size 2 extends beyond EOD, truncated [ 2649.860026] loop1: p4 start 1854537728 is beyond EOD, truncated [ 2649.956668] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 2650.025158] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 04:33:46 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:33:46 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:33:46 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0x0, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2650.099395] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 04:33:46 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:33:46 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000638128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2650.240667] device team0 entered promiscuous mode 04:33:46 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:33:46 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff07004c0000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2650.284112] device team_slave_0 entered promiscuous mode [ 2650.320078] device team_slave_1 entered promiscuous mode [ 2650.344668] 8021q: adding VLAN 0 to HW filter on device team0 04:33:47 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:33:47 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:33:47 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2650.568892] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 04:33:47 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0x0, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2650.614964] loop5: p1 < > p4 [ 2650.630198] loop5: partition table partially beyond EOD, truncated 04:33:47 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2650.683494] device team0 left promiscuous mode [ 2650.684439] loop5: p1 size 2 extends beyond EOD, truncated [ 2650.719912] device team_slave_0 left promiscuous mode [ 2650.727286] loop1: p1 < > p4 [ 2650.738550] loop1: partition table partially beyond EOD, truncated [ 2650.756818] loop5: p4 start 1854537728 is beyond EOD, truncated [ 2650.767784] device team_slave_1 left promiscuous mode [ 2650.791062] loop1: p1 size 2 extends beyond EOD, truncated [ 2650.828671] loop1: p4 start 1854537728 is beyond EOD, truncated 04:33:47 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:33:47 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, 0x0, 0x0) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:33:47 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2650.928853] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 2651.080856] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 2651.119343] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 04:33:47 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000688128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:47 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2651.155278] device team0 entered promiscuous mode 04:33:47 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:33:47 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700540000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2651.197414] device team_slave_0 entered promiscuous mode [ 2651.234792] device team_slave_1 entered promiscuous mode [ 2651.303659] 8021q: adding VLAN 0 to HW filter on device team0 04:33:47 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:33:48 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:33:48 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, 0x0, 0x0) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2651.411967] loop5: p1 < > p4 [ 2651.415391] loop5: partition table partially beyond EOD, truncated 04:33:48 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2651.495345] loop5: p1 size 2 extends beyond EOD, truncated [ 2651.553939] loop5: p4 start 1854537728 is beyond EOD, truncated [ 2651.558706] loop1: p1 < > p4 [ 2651.580227] loop1: partition table partially beyond EOD, truncated [ 2651.598974] loop1: p1 size 2 extends beyond EOD, truncated [ 2651.620243] device team0 left promiscuous mode [ 2651.639795] device team_slave_0 left promiscuous mode 04:33:48 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2651.652890] loop1: p4 start 1854537728 is beyond EOD, truncated [ 2651.684154] device team_slave_1 left promiscuous mode 04:33:48 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2651.794708] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 2651.864969] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 04:33:48 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:33:48 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa60000006c8128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:48 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, 0x0, 0x0) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2652.039180] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 04:33:48 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700550000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:48 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:33:48 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0x0, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:48 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff00000000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2652.227932] device team0 entered promiscuous mode [ 2652.232915] device team_slave_0 entered promiscuous mode [ 2652.304959] device team_slave_1 entered promiscuous mode [ 2652.370413] 8021q: adding VLAN 0 to HW filter on device team0 [ 2652.460490] loop5: p1 < > p4 [ 2652.474640] loop5: partition table partially beyond EOD, truncated [ 2652.482916] device team0 left promiscuous mode [ 2652.494986] device team_slave_0 left promiscuous mode 04:33:49 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x0, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2652.507631] device team_slave_1 left promiscuous mode [ 2652.517535] loop5: p1 size 2 extends beyond EOD, truncated 04:33:49 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2652.558351] loop5: p4 start 1854537728 is beyond EOD, truncated [ 2652.570125] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 04:33:49 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2652.700453] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 04:33:49 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700600000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:49 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x0, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:33:49 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:33:49 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000748128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:49 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x0, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2653.130024] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 2653.165460] loop1: p1 < > p4 04:33:49 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2653.204044] loop1: partition table partially beyond EOD, truncated [ 2653.264199] loop1: p1 size 2 extends beyond EOD, truncated [ 2653.343229] loop1: p4 start 1854537728 is beyond EOD, truncated [ 2653.421983] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 2653.682514] print_req_error: 12 callbacks suppressed [ 2653.682526] print_req_error: I/O error, dev loop1, sector 0 flags 80700 [ 2653.698136] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 2653.704632] buffer_io_error: 10 callbacks suppressed [ 2653.704658] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 2653.717780] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 2653.724231] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 2653.732170] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 2653.738657] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 2653.756033] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 2653.762465] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 2653.774763] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 2653.781308] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 2653.795348] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 2653.801842] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 2653.810309] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 2653.816866] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 2653.851707] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 2653.858217] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 2653.867979] print_req_error: I/O error, dev loop1, sector 0 flags 0 [ 2653.874469] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 2653.882002] Buffer I/O error on dev loop1p1, logical block 0, async page read 04:33:51 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:33:51 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:51 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa60000007a8128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:51 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:33:51 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:33:51 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700630000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2654.880824] device team0 entered promiscuous mode 04:33:51 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2654.902066] device team_slave_0 entered promiscuous mode [ 2654.917889] device team_slave_1 entered promiscuous mode 04:33:51 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2655.013114] 8021q: adding VLAN 0 to HW filter on device team0 [ 2655.165018] loop1: p1 < > p4 04:33:51 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:33:51 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2655.201036] loop1: partition table partially beyond EOD, truncated [ 2655.237983] loop5: p1 < > p4 [ 2655.241273] loop5: partition table partially beyond EOD, truncated [ 2655.261107] loop1: p1 size 2 extends beyond EOD, truncated [ 2655.274089] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 2655.299100] loop5: p1 size 2 extends beyond EOD, truncated 04:33:51 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2655.318712] loop5: p4 start 1854537728 is beyond EOD, truncated [ 2655.330627] loop1: p4 start 1854537728 is beyond EOD, truncated [ 2655.362539] device team0 left promiscuous mode 04:33:52 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2655.412177] device team_slave_0 left promiscuous mode 04:33:52 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2655.455819] device team_slave_1 left promiscuous mode [ 2655.491349] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 2655.532320] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 04:33:52 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700680000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:52 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa600000001fc28b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:52 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2655.799755] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 04:33:52 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2656.002004] loop1: p1 < > p4 [ 2656.014016] loop1: partition table partially beyond EOD, truncated [ 2656.041797] loop1: p1 size 2 extends beyond EOD, truncated 04:33:52 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2656.085119] loop1: p4 start 1854537728 is beyond EOD, truncated 04:33:52 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000008125b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2656.241097] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 2656.298665] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 04:33:52 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff07006c0000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2656.434521] loop5: p1 < > p4 [ 2656.446453] loop5: partition table partially beyond EOD, truncated [ 2656.463032] loop5: p1 size 2 extends beyond EOD, truncated [ 2656.523256] loop5: p4 start 1854537728 is beyond EOD, truncated [ 2656.642968] loop1: p1 < > p4 [ 2656.654807] loop1: partition table partially beyond EOD, truncated [ 2656.671763] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 2656.685699] loop1: p1 size 2 extends beyond EOD, truncated [ 2656.717596] loop1: p4 start 1854537728 is beyond EOD, truncated [ 2656.819358] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 04:33:54 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:33:54 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:54 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00000000000000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:33:54 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa600000000812fb14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:54 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700740000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:54 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2658.211430] device team0 entered promiscuous mode 04:33:54 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2658.231709] device team_slave_0 entered promiscuous mode [ 2658.253064] device team_slave_1 entered promiscuous mode [ 2658.327226] 8021q: adding VLAN 0 to HW filter on device team0 04:33:55 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:33:55 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:33:55 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2658.519892] loop_reread_partitions: partition scan of loop5 () failed (rc=-16) [ 2658.586418] loop1: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 p217 p218 p219 p [ 2658.586465] loop1: partition table partially beyond EOD, truncated [ 2658.683522] device team0 left promiscuous mode [ 2658.691628] device team_slave_0 left promiscuous mode [ 2658.700140] device team_slave_1 left promiscuous mode [ 2658.816481] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 04:33:55 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2200000000000000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2658.863192] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 04:33:55 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:55 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa600000000813eb14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2659.058294] loop1: p1 size 2 extends beyond EOD, truncated [ 2659.122485] loop1: p4 start 1854537728 is beyond EOD, truncated 04:33:55 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2602000000000000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2659.180209] loop1: p5 start 1854537728 is beyond EOD, truncated [ 2659.233679] loop1: p6 start 1854537728 is beyond EOD, truncated [ 2659.266090] loop1: p7 start 1854537728 is beyond EOD, truncated [ 2659.272548] loop1: p8 start 1854537728 is beyond EOD, truncated [ 2659.295094] loop5: p1 < > p4 [ 2659.304473] loop5: partition table partially beyond EOD, truncated [ 2659.311710] loop1: p9 start 1854537728 is beyond EOD, truncated [ 2659.321626] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 04:33:55 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2659.342465] loop1: p10 start 1854537728 is beyond EOD, truncated [ 2659.357127] loop5: p1 size 2 extends beyond EOD, truncated [ 2659.371572] loop1: p11 start 1854537728 is beyond EOD, truncated [ 2659.399957] loop1: p12 start 1854537728 is beyond EOD, truncated [ 2659.415700] loop5: p4 start 1854537728 is beyond EOD, truncated [ 2659.427804] loop1: p13 start 1854537728 is beyond EOD, truncated [ 2659.445520] loop1: p14 start 1854537728 is beyond EOD, truncated [ 2659.483696] loop1: p15 start 1854537728 is beyond EOD, truncated [ 2659.513986] loop1: p16 start 1854537728 is beyond EOD, truncated [ 2659.526225] loop1: p17 start 1854537728 is beyond EOD, truncated 04:33:56 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3400000000000000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2659.537631] loop1: p18 start 1854537728 is beyond EOD, truncated [ 2659.554230] loop1: p19 start 1854537728 is beyond EOD, truncated [ 2659.570329] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 2659.596141] loop1: p20 start 1854537728 is beyond EOD, truncated [ 2659.608818] loop1: p21 start 1854537728 is beyond EOD, truncated [ 2659.631791] loop1: p22 start 1854537728 is beyond EOD, truncated [ 2659.651485] loop1: p23 start 1854537728 is beyond EOD, truncated [ 2659.694961] loop1: p24 start 1854537728 is beyond EOD, truncated [ 2659.721183] loop1: p25 start 1854537728 is beyond EOD, truncated [ 2659.742232] loop1: p26 start 1854537728 is beyond EOD, truncated [ 2659.760721] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 2659.775968] loop1: p27 start 1854537728 is beyond EOD, truncated [ 2659.799128] loop1: p28 start 1854537728 is beyond EOD, truncated [ 2659.805308] loop1: p29 start 1854537728 is beyond EOD, truncated [ 2659.847364] loop1: p30 start 1854537728 is beyond EOD, truncated [ 2659.853543] loop1: p31 start 1854537728 is beyond EOD, truncated [ 2659.859798] loop1: p32 start 1854537728 is beyond EOD, truncated [ 2659.866069] loop1: p33 start 1854537728 is beyond EOD, truncated [ 2659.872224] loop1: p34 start 1854537728 is beyond EOD, truncated [ 2659.883545] loop1: p35 start 1854537728 is beyond EOD, truncated [ 2659.892220] loop1: p36 start 1854537728 is beyond EOD, truncated [ 2659.898428] loop1: p37 start 1854537728 is beyond EOD, truncated [ 2659.898441] loop1: p38 start 1854537728 is beyond EOD, truncated [ 2659.898451] loop1: p39 start 1854537728 is beyond EOD, truncated [ 2659.898462] loop1: p40 start 1854537728 is beyond EOD, truncated [ 2659.922231] loop1: p41 start 1854537728 is beyond EOD, truncated [ 2659.929587] loop1: p42 start 1854537728 is beyond EOD, truncated [ 2659.935741] loop1: p43 start 1854537728 is beyond EOD, truncated [ 2659.935753] loop1: p44 start 1854537728 is beyond EOD, truncated [ 2659.935764] loop1: p45 start 1854537728 is beyond EOD, truncated [ 2659.935778] loop1: p46 start 1854537728 is beyond EOD, truncated [ 2659.985998] loop1: p47 start 1854537728 is beyond EOD, truncated [ 2659.992277] loop1: p48 start 1854537728 is beyond EOD, truncated [ 2660.005945] loop1: p49 start 1854537728 is beyond EOD, truncated [ 2660.017841] loop1: p50 start 1854537728 is beyond EOD, truncated [ 2660.035316] loop1: p51 start 1854537728 is beyond EOD, truncated [ 2660.052982] loop1: p52 start 1854537728 is beyond EOD, truncated [ 2660.070488] loop1: p53 start 1854537728 is beyond EOD, truncated [ 2660.088014] loop1: p54 start 1854537728 is beyond EOD, truncated [ 2660.106606] loop1: p55 start 1854537728 is beyond EOD, truncated [ 2660.124216] loop1: p56 start 1854537728 is beyond EOD, truncated [ 2660.142850] loop1: p57 start 1854537728 is beyond EOD, truncated [ 2660.160501] loop1: p58 start 1854537728 is beyond EOD, truncated [ 2660.176946] loop1: p59 start 1854537728 is beyond EOD, truncated [ 2660.194478] loop1: p60 start 1854537728 is beyond EOD, truncated [ 2660.210901] loop1: p61 start 1854537728 is beyond EOD, truncated [ 2660.228396] loop1: p62 start 1854537728 is beyond EOD, truncated [ 2660.244738] loop1: p63 start 1854537728 is beyond EOD, truncated [ 2660.262278] loop1: p64 start 1854537728 is beyond EOD, truncated [ 2660.276000] loop1: p65 start 1854537728 is beyond EOD, truncated [ 2660.289562] loop1: p66 start 1854537728 is beyond EOD, truncated [ 2660.295790] loop1: p67 start 1854537728 is beyond EOD, truncated [ 2660.304734] loop1: p68 start 1854537728 is beyond EOD, truncated [ 2660.313846] loop1: p69 start 1854537728 is beyond EOD, truncated [ 2660.322934] loop1: p70 start 1854537728 is beyond EOD, truncated [ 2660.332006] loop1: p71 start 1854537728 is beyond EOD, truncated [ 2660.341347] loop1: p72 start 1854537728 is beyond EOD, truncated [ 2660.350476] loop1: p73 start 1854537728 is beyond EOD, truncated [ 2660.381939] loop1: p74 start 1854537728 is beyond EOD, truncated [ 2660.388198] loop1: p75 start 1854537728 is beyond EOD, truncated [ 2660.422226] loop1: p76 start 1854537728 is beyond EOD, truncated [ 2660.428493] loop1: p77 start 1854537728 is beyond EOD, truncated [ 2660.434732] loop1: p78 start 1854537728 is beyond EOD, truncated [ 2660.459595] loop1: p79 start 1854537728 is beyond EOD, truncated [ 2660.480082] loop1: p80 start 1854537728 is beyond EOD, truncated [ 2660.499673] loop1: p81 start 1854537728 is beyond EOD, truncated [ 2660.507823] loop1: p82 start 1854537728 is beyond EOD, truncated [ 2660.527722] loop1: p83 start 1854537728 is beyond EOD, truncated [ 2660.587316] loop1: p84 start 1854537728 is beyond EOD, truncated [ 2660.599673] loop1: p85 start 1854537728 is beyond EOD, truncated [ 2660.644161] loop1: p86 start 1854537728 is beyond EOD, truncated [ 2660.690829] loop1: p87 start 1854537728 is beyond EOD, truncated [ 2660.716117] loop1: p88 start 1854537728 is beyond EOD, truncated [ 2660.729016] loop1: p89 start 1854537728 is beyond EOD, truncated [ 2660.746362] loop1: p90 start 1854537728 is beyond EOD, truncated [ 2660.764968] loop1: p91 start 1854537728 is beyond EOD, truncated [ 2660.782539] loop1: p92 start 1854537728 is beyond EOD, truncated [ 2660.803044] loop1: p93 start 1854537728 is beyond EOD, truncated [ 2660.809607] loop1: p94 start 1854537728 is beyond EOD, truncated [ 2660.818315] loop1: p95 start 1854537728 is beyond EOD, truncated [ 2660.824764] loop1: p96 start 1854537728 is beyond EOD, truncated [ 2660.831114] loop1: p97 start 1854537728 is beyond EOD, truncated [ 2660.838362] loop1: p98 start 1854537728 is beyond EOD, truncated [ 2660.849240] loop1: p99 start 1854537728 is beyond EOD, truncated [ 2660.855492] loop1: p100 start 1854537728 is beyond EOD, truncated [ 2660.861865] loop1: p101 start 1854537728 is beyond EOD, truncated [ 2660.868253] loop1: p102 start 1854537728 is beyond EOD, truncated [ 2660.874577] loop1: p103 start 1854537728 is beyond EOD, truncated [ 2660.881957] loop1: p104 start 1854537728 is beyond EOD, truncated [ 2660.888487] loop1: p105 start 1854537728 is beyond EOD, truncated [ 2660.894808] loop1: p106 start 1854537728 is beyond EOD, truncated [ 2660.901186] loop1: p107 start 1854537728 is beyond EOD, truncated [ 2660.907551] loop1: p108 start 1854537728 is beyond EOD, truncated [ 2660.913906] loop1: p109 start 1854537728 is beyond EOD, truncated [ 2660.920297] loop1: p110 start 1854537728 is beyond EOD, truncated [ 2660.926723] loop1: p111 start 1854537728 is beyond EOD, truncated [ 2660.933136] loop1: p112 start 1854537728 is beyond EOD, truncated [ 2660.939519] loop1: p113 start 1854537728 is beyond EOD, truncated [ 2660.946824] loop1: p114 start 1854537728 is beyond EOD, truncated [ 2660.953165] loop1: p115 start 1854537728 is beyond EOD, truncated [ 2660.959563] loop1: p116 start 1854537728 is beyond EOD, truncated [ 2660.965950] loop1: p117 start 1854537728 is beyond EOD, truncated [ 2660.972277] loop1: p118 start 1854537728 is beyond EOD, truncated [ 2660.978644] loop1: p119 start 1854537728 is beyond EOD, truncated [ 2660.984973] loop1: p120 start 1854537728 is beyond EOD, truncated [ 2660.991334] loop1: p121 start 1854537728 is beyond EOD, truncated [ 2660.997698] loop1: p122 start 1854537728 is beyond EOD, truncated [ 2661.004017] loop1: p123 start 1854537728 is beyond EOD, truncated [ 2661.010382] loop1: p124 start 1854537728 is beyond EOD, truncated [ 2661.016738] loop1: p125 start 1854537728 is beyond EOD, truncated [ 2661.023063] loop1: p126 start 1854537728 is beyond EOD, truncated [ 2661.029430] loop1: p127 start 1854537728 is beyond EOD, truncated [ 2661.035748] loop1: p128 start 1854537728 is beyond EOD, truncated [ 2661.042132] loop1: p129 start 1854537728 is beyond EOD, truncated [ 2661.048546] loop1: p130 start 1854537728 is beyond EOD, truncated [ 2661.054934] loop1: p131 start 1854537728 is beyond EOD, truncated [ 2661.061321] loop1: p132 start 1854537728 is beyond EOD, truncated [ 2661.067685] loop1: p133 start 1854537728 is beyond EOD, truncated [ 2661.074014] loop1: p134 start 1854537728 is beyond EOD, truncated [ 2661.081157] loop1: p135 start 1854537728 is beyond EOD, truncated [ 2661.087677] loop1: p136 start 1854537728 is beyond EOD, truncated [ 2661.094085] loop1: p137 start 1854537728 is beyond EOD, truncated [ 2661.100555] loop1: p138 start 1854537728 is beyond EOD, truncated [ 2661.107012] loop1: p139 start 1854537728 is beyond EOD, truncated [ 2661.113337] loop1: p140 start 1854537728 is beyond EOD, truncated [ 2661.119813] loop1: p141 start 1854537728 is beyond EOD, truncated [ 2661.126235] loop1: p142 start 1854537728 is beyond EOD, truncated [ 2661.132591] loop1: p143 start 1854537728 is beyond EOD, truncated [ 2661.139052] loop1: p144 start 1854537728 is beyond EOD, truncated [ 2661.145421] loop1: p145 start 1854537728 is beyond EOD, truncated [ 2661.151963] loop1: p146 start 1854537728 is beyond EOD, truncated [ 2661.160038] loop1: p147 start 1854537728 is beyond EOD, truncated [ 2661.168572] loop1: p148 start 1854537728 is beyond EOD, truncated [ 2661.174824] loop1: p149 start 1854537728 is beyond EOD, truncated [ 2661.185154] loop1: p150 start 1854537728 is beyond EOD, truncated [ 2661.193529] loop1: p151 start 1854537728 is beyond EOD, truncated [ 2661.203748] loop1: p152 start 1854537728 is beyond EOD, truncated [ 2661.212063] loop1: p153 start 1854537728 is beyond EOD, truncated [ 2661.222423] loop1: p154 start 1854537728 is beyond EOD, truncated [ 2661.230925] loop1: p155 start 1854537728 is beyond EOD, truncated [ 2661.241231] loop1: p156 start 1854537728 is beyond EOD, truncated [ 2661.249589] loop1: p157 start 1854537728 is beyond EOD, truncated [ 2661.260860] loop1: p158 start 1854537728 is beyond EOD, truncated [ 2661.269258] loop1: p159 start 1854537728 is beyond EOD, truncated [ 2661.275523] loop1: p160 start 1854537728 is beyond EOD, truncated [ 2661.288113] loop1: p161 start 1854537728 is beyond EOD, truncated [ 2661.294366] loop1: p162 start 1854537728 is beyond EOD, truncated [ 2661.303864] loop1: p163 start 1854537728 is beyond EOD, truncated [ 2661.313335] loop1: p164 start 1854537728 is beyond EOD, truncated [ 2661.323038] loop1: p165 start 1854537728 is beyond EOD, truncated [ 2661.332344] loop1: p166 start 1854537728 is beyond EOD, truncated [ 2661.355941] loop1: p167 start 1854537728 is beyond EOD, truncated [ 2661.362195] loop1: p168 start 1854537728 is beyond EOD, truncated [ 2661.373329] loop1: p169 start 1854537728 is beyond EOD, truncated [ 2661.379946] loop1: p170 start 1854537728 is beyond EOD, truncated [ 2661.386471] loop1: p171 start 1854537728 is beyond EOD, truncated [ 2661.392720] loop1: p172 start 1854537728 is beyond EOD, truncated [ 2661.399354] loop1: p173 start 1854537728 is beyond EOD, truncated [ 2661.405617] loop1: p174 start 1854537728 is beyond EOD, truncated [ 2661.413677] loop1: p175 start 1854537728 is beyond EOD, truncated [ 2661.420504] loop1: p176 start 1854537728 is beyond EOD, truncated [ 2661.426870] loop1: p177 start 1854537728 is beyond EOD, truncated [ 2661.433380] loop1: p178 start 1854537728 is beyond EOD, truncated [ 2661.439691] loop1: p179 start 1854537728 is beyond EOD, truncated [ 2661.446195] loop1: p180 start 1854537728 is beyond EOD, truncated [ 2661.452440] loop1: p181 start 1854537728 is beyond EOD, truncated [ 2661.458996] loop1: p182 start 1854537728 is beyond EOD, truncated [ 2661.469920] loop1: p183 start 1854537728 is beyond EOD, truncated [ 2661.476239] loop1: p184 start 1854537728 is beyond EOD, truncated [ 2661.482805] loop1: p185 start 1854537728 is beyond EOD, truncated [ 2661.489369] loop1: p186 start 1854537728 is beyond EOD, truncated [ 2661.495615] loop1: p187 start 1854537728 is beyond EOD, truncated [ 2661.501959] loop1: p188 start 1854537728 is beyond EOD, truncated [ 2661.511123] loop1: p189 start 1854537728 is beyond EOD, truncated [ 2661.517764] loop1: p190 start 1854537728 is beyond EOD, truncated [ 2661.524062] loop1: p191 start 1854537728 is beyond EOD, truncated [ 2661.530848] loop1: p192 start 1854537728 is beyond EOD, truncated [ 2661.537465] loop1: p193 start 1854537728 is beyond EOD, truncated [ 2661.543719] loop1: p194 start 1854537728 is beyond EOD, truncated [ 2661.550296] loop1: p195 start 1854537728 is beyond EOD, truncated [ 2661.556986] loop1: p196 start 1854537728 is beyond EOD, truncated [ 2661.563252] loop1: p197 start 1854537728 is beyond EOD, truncated [ 2661.569922] loop1: p198 start 1854537728 is beyond EOD, truncated [ 2661.576519] loop1: p199 start 1854537728 is beyond EOD, truncated [ 2661.582768] loop1: p200 start 1854537728 is beyond EOD, truncated [ 2661.590237] loop1: p201 start 1854537728 is beyond EOD, truncated [ 2661.605954] loop1: p202 start 1854537728 is beyond EOD, truncated [ 2661.612206] loop1: p203 start 1854537728 is beyond EOD, truncated [ 2661.622625] loop1: p204 start 1854537728 is beyond EOD, truncated [ 2661.630728] loop1: p205 start 1854537728 is beyond EOD, truncated [ 2661.640688] loop1: p206 start 1854537728 is beyond EOD, truncated [ 2661.649105] loop1: p207 start 1854537728 is beyond EOD, truncated [ 2661.659762] loop1: p208 start 1854537728 is beyond EOD, truncated [ 2661.676072] loop1: p209 start 1854537728 is beyond EOD, truncated [ 2661.682583] loop1: p210 start 1854537728 is beyond EOD, truncated [ 2661.691245] loop1: p211 start 1854537728 is beyond EOD, truncated [ 2661.697751] loop1: p212 start 1854537728 is beyond EOD, truncated [ 2661.703999] loop1: p213 start 1854537728 is beyond EOD, truncated [ 2661.714460] loop1: p214 start 1854537728 is beyond EOD, truncated [ 2661.722704] loop1: p215 start 1854537728 is beyond EOD, truncated [ 2661.733523] loop1: p216 start 1854537728 is beyond EOD, truncated [ 2661.741909] loop1: p217 start 1854537728 is beyond EOD, truncated [ 2661.752976] loop1: p218 start 1854537728 is beyond EOD, truncated [ 2661.761306] loop1: p219 start 1854537728 is beyond EOD, truncated [ 2661.771972] loop1: p220 start 1854537728 is beyond EOD, truncated [ 2661.780204] loop1: p221 start 1854537728 is beyond EOD, truncated [ 2661.790260] loop1: p222 start 1854537728 is beyond EOD, truncated [ 2661.799176] loop1: p223 start 1854537728 is beyond EOD, truncated [ 2661.805426] loop1: p224 start 1854537728 is beyond EOD, truncated [ 2661.812020] loop1: p225 start 1854537728 is beyond EOD, truncated [ 2661.818468] loop1: p226 start 1854537728 is beyond EOD, truncated [ 2661.824712] loop1: p227 start 1854537728 is beyond EOD, truncated [ 2661.831105] loop1: p228 start 1854537728 is beyond EOD, truncated [ 2661.840028] loop1: p229 start 1854537728 is beyond EOD, truncated [ 2661.850042] loop1: p230 start 1854537728 is beyond EOD, truncated [ 2661.858293] loop1: p231 start 1854537728 is beyond EOD, truncated [ 2661.864543] loop1: p232 start 1854537728 is beyond EOD, truncated [ 2661.874332] loop1: p233 start 1854537728 is beyond EOD, truncated [ 2661.882571] loop1: p234 start 1854537728 is beyond EOD, truncated [ 2661.894286] loop1: p235 start 1854537728 is beyond EOD, truncated [ 2661.902436] loop1: p236 start 1854537728 is beyond EOD, truncated [ 2661.912465] loop1: p237 start 1854537728 is beyond EOD, truncated [ 2661.920897] loop1: p238 start 1854537728 is beyond EOD, truncated [ 2661.930995] loop1: p239 start 1854537728 is beyond EOD, truncated [ 2661.939238] loop1: p240 start 1854537728 is beyond EOD, truncated [ 2661.945502] loop1: p241 start 1854537728 is beyond EOD, truncated [ 2661.958553] loop1: p242 start 1854537728 is beyond EOD, truncated [ 2661.964799] loop1: p243 start 1854537728 is beyond EOD, truncated [ 2661.974980] loop1: p244 start 1854537728 is beyond EOD, truncated [ 2661.984219] loop1: p245 start 1854537728 is beyond EOD, truncated [ 2661.993219] loop1: p246 start 1854537728 is beyond EOD, truncated [ 2662.002611] loop1: p247 start 1854537728 is beyond EOD, truncated [ 2662.011893] loop1: p248 start 1854537728 is beyond EOD, truncated [ 2662.021131] loop1: p249 start 1854537728 is beyond EOD, truncated [ 2662.031238] loop1: p250 start 1854537728 is beyond EOD, truncated [ 2662.040406] loop1: p251 start 1854537728 is beyond EOD, truncated [ 2662.049641] loop1: p252 start 1854537728 is beyond EOD, truncated [ 2662.058823] loop1: p253 start 1854537728 is beyond EOD, truncated [ 2662.065109] loop1: p254 start 1854537728 is beyond EOD, truncated [ 2662.074502] loop1: p255 start 1854537728 is beyond EOD, truncated 04:33:58 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff07007a0000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:58 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000008146b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:58 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:33:58 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:33:58 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:33:58 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, 0x0, 0x0) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2662.256737] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 2662.301556] device team0 entered promiscuous mode [ 2662.317689] device team_slave_0 entered promiscuous mode [ 2662.330692] device team_slave_1 entered promiscuous mode 04:33:58 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2662.382839] 8021q: adding VLAN 0 to HW filter on device team0 [ 2662.420204] loop5: p1 < > p4 [ 2662.425207] loop5: partition table partially beyond EOD, truncated 04:33:59 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, 0x0, 0x0) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2662.474748] loop5: p1 size 2 extends beyond EOD, truncated 04:33:59 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:33:59 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000300000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2662.562727] loop5: p4 start 1854537728 is beyond EOD, truncated 04:33:59 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2662.616143] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 04:33:59 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2662.690686] device team0 left promiscuous mode [ 2662.703591] device team_slave_0 left promiscuous mode [ 2662.726392] device team_slave_1 left promiscuous mode [ 2662.754717] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 2662.820328] device team0 left promiscuous mode [ 2662.831248] device team_slave_0 left promiscuous mode [ 2662.879365] Dev loop1: unable to read RDB block 1 [ 2662.896793] loop1: unable to read partition table [ 2662.899075] device team_slave_1 left promiscuous mode 04:33:59 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, 0x0, 0x0) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:33:59 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000008164b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2662.933280] loop1: partition table beyond EOD, truncated [ 2662.945557] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 04:33:59 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6600000000000000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2663.101778] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 2663.119246] device team0 entered promiscuous mode 04:33:59 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2663.150447] device team_slave_0 entered promiscuous mode [ 2663.160306] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 2663.178082] device team_slave_1 entered promiscuous mode 04:33:59 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2663.234676] print_req_error: 45 callbacks suppressed [ 2663.234688] print_req_error: I/O error, dev loop5, sector 0 flags 80700 [ 2663.268547] 8021q: adding VLAN 0 to HW filter on device team0 [ 2663.285422] print_req_error: I/O error, dev loop5, sector 0 flags 0 [ 2663.292059] buffer_io_error: 40 callbacks suppressed [ 2663.292070] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 2663.307454] print_req_error: I/O error, dev loop5, sector 0 flags 0 [ 2663.313974] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 2663.321952] print_req_error: I/O error, dev loop5, sector 0 flags 0 [ 2663.328487] Buffer I/O error on dev loop5p1, logical block 0, async page read 04:33:59 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800000000000000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2663.336116] print_req_error: I/O error, dev loop5, sector 0 flags 0 [ 2663.342590] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 2663.350611] print_req_error: I/O error, dev loop5, sector 0 flags 0 [ 2663.357119] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 2663.365100] print_req_error: I/O error, dev loop5, sector 0 flags 0 [ 2663.371629] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 2663.379831] print_req_error: I/O error, dev loop5, sector 0 flags 0 [ 2663.386424] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 2663.394209] print_req_error: I/O error, dev loop5, sector 0 flags 0 [ 2663.400749] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 2663.409414] print_req_error: I/O error, dev loop5, sector 0 flags 0 [ 2663.415945] Buffer I/O error on dev loop5p1, logical block 0, async page read 04:34:00 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000008128b16400000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:34:00 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2663.433588] device team0 entered promiscuous mode [ 2663.439936] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 2663.454942] device team_slave_0 entered promiscuous mode 04:34:00 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000500000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2663.495472] device team_slave_1 entered promiscuous mode [ 2663.571593] 8021q: adding VLAN 0 to HW filter on device team0 04:34:00 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6e00000000000000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2663.700824] device team0 left promiscuous mode [ 2663.708279] device team_slave_0 left promiscuous mode [ 2663.739270] device team_slave_1 left promiscuous mode 04:34:00 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2663.875221] loop5: p1 < > p4 [ 2663.900356] loop5: partition table partially beyond EOD, truncated [ 2663.918035] loop5: p1 size 2 extends beyond EOD, truncated [ 2663.927390] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 2663.969396] loop5: p4 start 1854537728 is beyond EOD, truncated 04:34:00 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000600000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:34:00 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000000000000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2664.026573] device team0 left promiscuous mode 04:34:00 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2664.054918] device team_slave_0 left promiscuous mode [ 2664.097926] device team_slave_1 left promiscuous mode 04:34:00 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2664.169420] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 2664.275376] device team0 entered promiscuous mode [ 2664.290795] device team_slave_0 entered promiscuous mode 04:34:00 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000008128b1fc01000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2664.323219] device team_slave_1 entered promiscuous mode 04:34:01 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff00000000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2664.391103] Dev loop1: unable to read RDB block 1 [ 2664.406781] 8021q: adding VLAN 0 to HW filter on device team0 [ 2664.420234] loop1: unable to read partition table [ 2664.467755] loop1: partition table beyond EOD, truncated 04:34:01 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2664.513551] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 2664.551662] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 04:34:01 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:34:01 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa403000000000000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:34:01 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2664.667340] device team0 entered promiscuous mode [ 2664.678686] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 2664.682776] device team_slave_0 entered promiscuous mode [ 2664.703678] device team_slave_1 entered promiscuous mode [ 2664.773265] 8021q: adding VLAN 0 to HW filter on device team0 [ 2664.793184] loop5: p1 < > p4 [ 2664.804977] loop5: partition table partially beyond EOD, truncated [ 2664.818614] device team0 left promiscuous mode [ 2664.834442] loop5: p1 size 2 extends beyond EOD, truncated [ 2664.841752] device team_slave_0 left promiscuous mode 04:34:01 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000700000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:34:01 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2664.895163] loop5: p4 start 1854537728 is beyond EOD, truncated [ 2664.914565] device team_slave_1 left promiscuous mode 04:34:01 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r1, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2665.020547] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 2665.070568] device team0 left promiscuous mode 04:34:01 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc003000000000000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2665.098760] device team_slave_0 left promiscuous mode [ 2665.130448] device team_slave_1 left promiscuous mode 04:34:01 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100)}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:34:01 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000008128b14702000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2665.207848] Dev loop1: unable to read RDB block 1 [ 2665.213787] loop1: unable to read partition table 04:34:01 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r1, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2665.264931] loop1: partition table beyond EOD, truncated [ 2665.276671] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 2665.300631] device team0 entered promiscuous mode [ 2665.305630] device team_slave_0 entered promiscuous mode [ 2665.342453] device team_slave_1 entered promiscuous mode [ 2665.386517] 8021q: adding VLAN 0 to HW filter on device team0 [ 2665.443192] loop5: p1 < > p4 04:34:02 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd003000000000000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:34:02 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2665.477416] loop5: partition table partially beyond EOD, [ 2665.477482] truncated [ 2665.491799] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 2665.503491] loop5: p1 size 2 extends beyond EOD, truncated 04:34:02 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100)}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2665.557369] loop5: p4 start 1854537728 is beyond EOD, truncated [ 2665.615504] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 2665.635471] device team0 entered promiscuous mode [ 2665.654831] device team_slave_0 entered promiscuous mode 04:34:02 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000900000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2665.727386] device team_slave_1 entered promiscuous mode [ 2665.809376] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 04:34:02 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000008128b14703000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:34:02 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r1, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:34:02 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdc03000000000000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2665.866843] 8021q: adding VLAN 0 to HW filter on device team0 [ 2665.932131] device team0 left promiscuous mode [ 2665.953870] device team_slave_0 left promiscuous mode [ 2665.972506] Dev loop1: unable to read RDB block 1 [ 2665.979737] device team_slave_1 left promiscuous mode [ 2665.986667] loop1: unable to read partition table 04:34:02 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2666.004424] loop1: partition table beyond EOD, truncated [ 2666.039900] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 04:34:02 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe801000000000000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:34:02 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100)}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2666.255802] loop5: p1 < > p4 [ 2666.264543] device team0 left promiscuous mode [ 2666.276180] device team_slave_0 left promiscuous mode [ 2666.276532] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 2666.292912] loop5: partition table partially beyond EOD, truncated [ 2666.295368] device team_slave_1 left promiscuous mode [ 2666.328503] loop5: p1 size 2 extends beyond EOD, truncated [ 2666.388976] loop5: p4 start 1854537728 is beyond EOD, truncated [ 2666.500308] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 04:34:03 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000f00000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:34:03 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x0, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2666.594589] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 04:34:03 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf003000000000000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:34:03 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:34:03 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000008128b14704000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2666.817569] device team0 entered promiscuous mode 04:34:03 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2666.843375] device team_slave_0 entered promiscuous mode [ 2666.871763] device team_slave_1 entered promiscuous mode [ 2666.940922] 8021q: adding VLAN 0 to HW filter on device team0 [ 2666.969098] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 04:34:03 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff00000000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:34:03 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x0, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:34:03 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff07001d0f00000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2667.013948] device team0 entered promiscuous mode [ 2667.028751] device team_slave_0 entered promiscuous mode [ 2667.054623] device team_slave_1 entered promiscuous mode 04:34:03 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2667.101421] 8021q: adding VLAN 0 to HW filter on device team0 [ 2667.153294] loop5: p1 < > p4 [ 2667.171801] loop5: partition table partially beyond EOD, truncated [ 2667.191814] loop5: p1 size 2 extends beyond EOD, truncated 04:34:03 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x0, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2667.217032] loop5: p4 start 1854537728 is beyond EOD, truncated [ 2667.223917] device team0 left promiscuous mode 04:34:03 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff00000000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:34:03 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2667.263426] device team_slave_0 left promiscuous mode [ 2667.310929] device team_slave_1 left promiscuous mode [ 2667.399606] Dev loop1: unable to read RDB block 1 [ 2667.411593] loop1: unable to read partition table [ 2667.440965] loop1: partition table beyond EOD, truncated [ 2667.441327] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 2667.477242] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 2667.491289] device team0 left promiscuous mode [ 2667.503657] device team_slave_0 left promiscuous mode 04:34:04 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfa03000000000000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2667.565394] device team_slave_1 left promiscuous mode 04:34:04 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000008128b14705000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:34:04 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2667.772001] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 2667.802287] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 04:34:04 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x0) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2667.934980] device team0 entered promiscuous mode 04:34:04 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:34:04 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2667.958215] device team_slave_0 entered promiscuous mode [ 2667.993700] loop5: p1 < > p4 [ 2668.001626] device team_slave_1 entered promiscuous mode 04:34:04 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff07000f1d00000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2668.021808] loop5: partition table partially beyond EOD, truncated [ 2668.062707] 8021q: adding VLAN 0 to HW filter on device team0 [ 2668.098604] loop5: p1 size 2 extends beyond EOD, truncated 04:34:04 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2668.147239] device team0 entered promiscuous mode [ 2668.147372] loop5: p4 start 1854537728 is beyond EOD, truncated [ 2668.163162] device team_slave_0 entered promiscuous mode [ 2668.175418] device team_slave_1 entered promiscuous mode 04:34:04 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, 0x0, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2668.210133] 8021q: adding VLAN 0 to HW filter on device team0 [ 2668.241574] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 2668.296566] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 04:34:04 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:34:04 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:34:05 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x0) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2668.370554] device team0 left promiscuous mode [ 2668.375795] device team_slave_0 left promiscuous mode [ 2668.379736] Dev loop1: unable to read RDB block 1 [ 2668.396045] device team_slave_1 left promiscuous mode [ 2668.414047] loop1: unable to read partition table [ 2668.426835] loop1: partition table beyond EOD, truncated [ 2668.443142] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 04:34:05 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000008128b14706000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2668.555657] device team0 left promiscuous mode [ 2668.571329] device team_slave_0 left promiscuous mode [ 2668.579003] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 2668.597349] device team_slave_1 left promiscuous mode 04:34:05 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, 0x0, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:34:05 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2668.820963] device team0 entered promiscuous mode [ 2668.831075] device team_slave_0 entered promiscuous mode [ 2668.845310] device team_slave_1 entered promiscuous mode 04:34:05 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700001f00000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2668.890111] 8021q: adding VLAN 0 to HW filter on device team0 [ 2668.899420] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 04:34:05 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x0) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:34:05 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000008128b14707000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:34:05 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:34:05 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, 0x0, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2669.150955] device team0 entered promiscuous mode [ 2669.163131] device team_slave_0 entered promiscuous mode [ 2669.182423] device team_slave_1 entered promiscuous mode 04:34:05 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2669.218910] 8021q: adding VLAN 0 to HW filter on device team0 [ 2669.252861] device team0 left promiscuous mode [ 2669.268186] Dev loop1: unable to read RDB block 1 [ 2669.280166] device team_slave_0 left promiscuous mode [ 2669.288916] loop1: unable to read partition table [ 2669.305064] loop1: partition table beyond EOD, truncated [ 2669.332268] device team_slave_1 left promiscuous mode [ 2669.344045] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 04:34:06 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2669.498955] loop5: p1 < > p4 [ 2669.538225] loop5: partition table partially beyond EOD, truncated [ 2669.576952] loop5: p1 size 2 extends beyond EOD, truncated [ 2669.617061] loop5: p4 start 1854537728 is beyond EOD, truncated [ 2669.628319] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 2669.684495] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 04:34:06 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2669.763577] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 04:34:06 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, 0x0) 04:34:06 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000008128b14708000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:34:06 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700002000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:34:06 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:34:06 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2670.138897] device team0 entered promiscuous mode [ 2670.156031] device team_slave_0 entered promiscuous mode [ 2670.174422] device team_slave_1 entered promiscuous mode 04:34:06 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2670.249336] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 2670.265472] 8021q: adding VLAN 0 to HW filter on device team0 04:34:06 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, 0x0) [ 2670.347432] device team0 left promiscuous mode [ 2670.359813] device team_slave_0 left promiscuous mode 04:34:07 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2670.406611] loop5: p1 < > p4 [ 2670.410673] loop5: partition table partially beyond EOD, truncated [ 2670.420737] device team_slave_1 left promiscuous mode [ 2670.437280] loop5: p1 size 2 extends beyond EOD, truncated [ 2670.462439] loop5: p4 start 1854537728 is beyond EOD, truncated 04:34:07 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700002300000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2670.593159] device team0 left promiscuous mode [ 2670.605505] device team_slave_0 left promiscuous mode 04:34:07 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2670.645179] device team_slave_1 left promiscuous mode [ 2670.689427] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 04:34:07 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:34:07 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000008128b14709000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2670.919977] device team0 entered promiscuous mode [ 2670.925244] device team_slave_0 entered promiscuous mode [ 2670.934176] device team_slave_1 entered promiscuous mode [ 2670.962727] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 04:34:07 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, 0x0) [ 2671.005290] 8021q: adding VLAN 0 to HW filter on device team0 [ 2671.013899] Dev loop1: unable to read RDB block 1 [ 2671.030530] loop1: unable to read partition table [ 2671.078582] loop1: partition table beyond EOD, truncated 04:34:07 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2671.121489] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 2671.154371] loop5: p1 < > p4 04:34:07 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:34:07 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2671.179733] loop5: partition table partially beyond EOD, truncated [ 2671.207839] loop5: p1 size 2 extends beyond EOD, truncated [ 2671.242681] loop5: p4 start 1854537728 is beyond EOD, truncated [ 2671.289718] device team0 left promiscuous mode [ 2671.299294] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 2671.347597] device team_slave_0 left promiscuous mode [ 2671.375145] device team_slave_1 left promiscuous mode 04:34:08 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700003f00000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2671.428462] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 2671.460619] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 04:34:08 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)) 04:34:08 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:34:08 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000008128b1470f000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:34:08 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:34:08 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x0, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:34:08 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700004000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2671.892051] device team0 entered promiscuous mode [ 2671.920632] device team_slave_0 entered promiscuous mode [ 2671.952233] device team_slave_1 entered promiscuous mode 04:34:08 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2672.045370] 8021q: adding VLAN 0 to HW filter on device team0 04:34:08 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2672.112394] __loop_clr_fd: partition scan of loop4 failed (rc=-22) 04:34:08 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)) [ 2672.258306] loop5: p1 < > p4 [ 2672.262676] loop5: partition table partially beyond EOD, truncated [ 2672.307110] Dev loop1: unable to read RDB block 1 [ 2672.312401] loop1: unable to read partition table [ 2672.318429] device team0 left promiscuous mode [ 2672.320660] loop5: p1 size 2 extends beyond EOD, truncated [ 2672.340399] device team_slave_0 left promiscuous mode [ 2672.353698] loop5: p4 start 1854537728 is beyond EOD, truncated 04:34:09 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x0, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2672.390824] loop1: partition table beyond EOD, truncated [ 2672.398096] device team_slave_1 left promiscuous mode [ 2672.443658] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 04:34:09 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2672.551362] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 2672.574331] device team0 entered promiscuous mode [ 2672.626448] device team_slave_0 entered promiscuous mode [ 2672.650724] device team_slave_1 entered promiscuous mode 04:34:09 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100)}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2672.712314] 8021q: adding VLAN 0 to HW filter on device team0 04:34:09 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000008128b14710000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2672.802963] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 2672.816146] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 04:34:09 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x0, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:34:09 executing program 4: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x0, 0x0) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)) 04:34:09 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2672.900963] device team0 entered promiscuous mode 04:34:09 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700004200000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2672.922644] device team_slave_0 entered promiscuous mode [ 2672.961936] device team_slave_1 entered promiscuous mode [ 2673.039122] 8021q: adding VLAN 0 to HW filter on device team0 [ 2673.095117] loop5: p1 < > p4 [ 2673.111755] device team0 left promiscuous mode [ 2673.112943] loop5: partition table partially beyond EOD, truncated [ 2673.128117] device team_slave_0 left promiscuous mode [ 2673.138814] loop5: p1 size 2 extends beyond EOD, truncated [ 2673.179214] device team_slave_1 left promiscuous mode 04:34:09 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100)}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:34:09 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x66, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2673.200950] loop5: p4 start 1854537728 is beyond EOD, truncated [ 2673.361869] device team0 left promiscuous mode [ 2673.381770] device team_slave_0 left promiscuous mode [ 2673.396854] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 04:34:10 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700004800000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2673.467711] device team_slave_1 left promiscuous mode 04:34:10 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, 0x0}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2673.572387] __loop_clr_fd: partition scan of loop4 failed (rc=-22) [ 2673.652606] device team0 entered promiscuous mode [ 2673.661199] device team_slave_0 entered promiscuous mode [ 2673.673080] device team_slave_1 entered promiscuous mode [ 2673.709726] 8021q: adding VLAN 0 to HW filter on device team0 04:34:10 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000008128b14723000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:34:10 executing program 4: getitimer(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, 0x0) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) [ 2673.819268] Dev loop1: unable to read RDB block 1 04:34:10 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2673.853094] loop1: unable to read partition table 04:34:10 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, 0x0}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:34:10 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x0, 0x0) read(r0, &(0x7f0000000040)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000140)) r2 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f00000001c0)) dup3(r0, r2, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r3, 0x16) [ 2673.882441] loop1: partition table beyond EOD, truncated 04:34:10 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100)}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2673.927826] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 2673.989661] device team0 entered promiscuous mode [ 2674.006802] device team_slave_0 entered promiscuous mode [ 2674.029070] device team_slave_1 entered promiscuous mode [ 2674.062056] 8021q: adding VLAN 0 to HW filter on device team0 [ 2674.096859] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 2674.103912] device team0 left promiscuous mode 04:34:10 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6e, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2674.118280] device team_slave_0 left promiscuous mode 04:34:10 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2674.152815] device team_slave_1 left promiscuous mode [ 2674.215438] loop5: p1 < > p4 04:34:10 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) r1 = socket(0x2, 0x7, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') r3 = dup3(r0, r0, 0x80000) ioctl$RNDADDENTROPY(r3, 0x40085203, &(0x7f0000000600)={0x0, 0x18, "31436260b08cc06adb84a965e7253550a4393b2608790753"}) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x5c, r2, 0x600, 0x70bd2c, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x800}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x101}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x800}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@empty}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004811}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r1, &(0x7f0000000580)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000400)={0x12c, 0x0, 0x8, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xb2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x40}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x10001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x100}]}, @TIPC_NLA_NET={0x20, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xa0}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xe23}]}, @TIPC_NLA_NET={0x20, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x18000000000}, @TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_ID={0x8}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffffffffffa}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3ff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xdd}]}, @TIPC_NLA_BEARER={0x44, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @remote}}, {0x14, 0x2, @in={0x2, 0x4e24, @remote}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xf}]}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1f}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8}]}]}, 0x12c}, 0x1, 0x0, 0x0, 0x8080}, 0x4) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r4, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="000128bd7000fcdbdf"], 0x1}, 0x1, 0x0, 0x0, 0x4000040}, 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) ioctl$TCFLSH(r0, 0x80047437, 0x70a000) close(r0) [ 2674.236198] loop5: partition table partially beyond EOD, truncated [ 2674.257492] loop5: p1 size 2 extends beyond EOD, truncated [ 2674.284364] device team0 left promiscuous mode [ 2674.292037] device team_slave_0 left promiscuous mode [ 2674.311703] loop5: p4 start 1854537728 is beyond EOD, truncated 04:34:10 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700004c00000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:34:10 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, 0x0}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2674.343962] device team_slave_1 left promiscuous mode [ 2674.429811] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 2674.494201] device team0 entered promiscuous mode 04:34:11 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e8, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2674.534559] device team_slave_0 entered promiscuous mode 04:34:11 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000008128b14742000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:34:11 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x3) r1 = socket(0x2, 0x7, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') r3 = dup3(r0, r0, 0x80000) ioctl$RNDADDENTROPY(r3, 0x40085203, &(0x7f0000000600)={0x0, 0x18, "31436260b08cc06adb84a965e7253550a4393b2608790753"}) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x5c, r2, 0x600, 0x70bd2c, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x800}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x101}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x800}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@empty}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4004811}, 0x4) sendmsg$TIPC_NL_BEARER_DISABLE(r1, &(0x7f0000000580)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000540)={&(0x7f0000000400)={0x12c, 0x0, 0x8, 0x70bd26, 0x25dfdbfe, {}, [@TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xb2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x40}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x10001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x100}]}, @TIPC_NLA_NET={0x20, 0x7, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xa0}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xe23}]}, @TIPC_NLA_NET={0x20, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x18000000000}, @TIPC_NLA_NET_ADDR={0x8}, @TIPC_NLA_NET_ID={0x8}]}, @TIPC_NLA_MON={0x34, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffffffffffa}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3ff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xdd}]}, @TIPC_NLA_BEARER={0x44, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @remote}}, {0x14, 0x2, @in={0x2, 0x4e24, @remote}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xf}]}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1f}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_REF={0x8}]}]}, 0x12c}, 0x1, 0x0, 0x0, 0x8080}, 0x4) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_GET_TUNSRC(r4, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="000128bd7000fcdbdf"], 0x1}, 0x1, 0x0, 0x0, 0x4000040}, 0x4) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) ioctl$TCFLSH(r0, 0x80047437, 0x70a000) close(r0) [ 2674.577453] device team_slave_1 entered promiscuous mode [ 2674.663284] Dev loop1: unable to read RDB block 1 [ 2674.706515] loop1: unable to read partition table [ 2674.712132] loop1: partition table beyond EOD, truncated [ 2674.722704] 8021q: adding VLAN 0 to HW filter on device team0 04:34:11 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2674.814372] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 04:34:11 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2674.871463] loop5: p1 < > p4 [ 2674.889611] loop5: partition table partially beyond EOD, truncated [ 2674.911625] loop5: p1 size 2 extends beyond EOD, truncated 04:34:11 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x226, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:34:11 executing program 4: r0 = perf_event_open(&(0x7f0000aaa000)={0x2, 0x70, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/igmp\x00') sendfile(r0, r1, &(0x7f0000000000)=0x4c0001ff, 0x1000a) [ 2674.943714] device team0 entered promiscuous mode [ 2674.953937] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 2674.976310] device team_slave_0 entered promiscuous mode [ 2674.995404] device team_slave_1 entered promiscuous mode [ 2675.011008] loop5: p4 start 1854537728 is beyond EOD, truncated 04:34:11 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700005400000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2675.102644] 8021q: adding VLAN 0 to HW filter on device team0 [ 2675.188551] device team0 left promiscuous mode [ 2675.201235] device team_slave_0 left promiscuous mode [ 2675.203359] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 2675.239009] device team_slave_1 left promiscuous mode 04:34:11 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:34:11 executing program 4: r0 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000240)=0xc) mknod$loop(&(0x7f0000000100)='./file0\x00', 0xa, 0xffffffffffffffff) setxattr$security_capability(0x0, &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) setresuid(r1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) setxattr$security_capability(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000140)='security.capability\x00', 0x0, 0x0, 0x1) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) pipe2(0x0, 0x0) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="2c21202e2f66696cb9bd"], 0xa) close(0xffffffffffffffff) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffff) 04:34:11 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000008128b14748000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2675.399861] Dev loop1: unable to read RDB block 1 [ 2675.405555] loop1: unable to read partition table [ 2675.437492] loop1: partition table beyond EOD, truncated 04:34:12 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:34:12 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2675.453773] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 2675.472596] device team0 left promiscuous mode [ 2675.523232] device team_slave_0 left promiscuous mode 04:34:12 executing program 4: r0 = socket(0x10, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000000240)=0xc) mknod$loop(&(0x7f0000000100)='./file0\x00', 0xa, 0xffffffffffffffff) setxattr$security_capability(0x0, &(0x7f0000000080)='security.capability\x00', 0x0, 0x0, 0x0) setresuid(r1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000340)) setxattr$security_capability(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000140)='security.capability\x00', 0x0, 0x0, 0x1) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, 0xffffffffffffffff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0xff92) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x800) ioctl$BLKPBSZGET(r2, 0x127b, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x3) pipe2(0x0, 0x0) write$binfmt_script(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="2c21202e2f66696cb9bd"], 0xa) close(0xffffffffffffffff) clone(0x10002102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mknod$loop(&(0x7f0000000100)='./file0\x00', 0x0, 0xffffffffffffffff) [ 2675.586868] device team_slave_1 left promiscuous mode [ 2675.604637] loop5: p1 < > p4 [ 2675.633621] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 2675.643006] loop5: partition table partially beyond EOD, truncated [ 2675.692524] loop5: p1 size 2 extends beyond EOD, truncated [ 2675.721653] device team0 entered promiscuous mode [ 2675.734224] device team_slave_0 entered promiscuous mode 04:34:12 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700005500000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2675.755343] loop5: p4 start 1854537728 is beyond EOD, truncated [ 2675.767673] device team_slave_1 entered promiscuous mode 04:34:12 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r1, 0x0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f00000002c0)={r1, r1}) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0c0583b, 0x20000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000580)='/\x02roup.stap\x00') ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x100000000, 0x5, 0x4, 0x1, r1, 0x1000}, 0x2c) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r1, 0x50, &(0x7f00000003c0)}, 0x10) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0xe3db, 0x7fff, 0x5, 0x1e03, 0x0, 0x2207, 0x20, 0x7, 0xf1, 0x7f, 0x4, 0x7, 0xffffffffffff7fff, 0x1f, 0x4, 0x2, 0x4, 0x1f, 0x1, 0x80000001, 0x80000000, 0xb03, 0xe6, 0x0, 0x0, 0xfffffffffffffffc, 0xf, 0xffffffff, 0x2, 0x8, 0x2, 0xff, 0x421e6e12, 0xfff, 0x8000, 0x0, 0x0, 0x80, 0x1, @perf_bp={0x0, 0x2}, 0x0, 0xd1, 0x4, 0x7, 0x7, 0x7f, 0xfffffffffffffffb}, 0xffffffffffffffff, 0xe, r1, 0x2) [ 2675.834687] 8021q: adding VLAN 0 to HW filter on device team0 [ 2675.861128] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 04:34:12 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a4, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:34:12 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:34:12 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:34:12 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000008128b1474c000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:34:12 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r1, 0x0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f00000002c0)={r1, r1}) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0c0583b, 0x20000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000580)='/\x02roup.stap\x00') ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x100000000, 0x5, 0x4, 0x1, r1, 0x1000}, 0x2c) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r1, 0x50, &(0x7f00000003c0)}, 0x10) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0xe3db, 0x7fff, 0x5, 0x1e03, 0x0, 0x2207, 0x20, 0x7, 0xf1, 0x7f, 0x4, 0x7, 0xffffffffffff7fff, 0x1f, 0x4, 0x2, 0x4, 0x1f, 0x1, 0x80000001, 0x80000000, 0xb03, 0xe6, 0x0, 0x0, 0xfffffffffffffffc, 0xf, 0xffffffff, 0x2, 0x8, 0x2, 0xff, 0x421e6e12, 0xfff, 0x8000, 0x0, 0x0, 0x80, 0x1, @perf_bp={0x0, 0x2}, 0x0, 0xd1, 0x4, 0x7, 0x7, 0x7f, 0xfffffffffffffffb}, 0xffffffffffffffff, 0xe, r1, 0x2) [ 2676.080400] device team0 entered promiscuous mode [ 2676.087742] Dev loop1: unable to read RDB block 1 [ 2676.107522] device team_slave_0 entered promiscuous mode [ 2676.113240] loop1: unable to read partition table [ 2676.131114] device team_slave_1 entered promiscuous mode [ 2676.142019] loop1: partition table beyond EOD, truncated [ 2676.174298] 8021q: adding VLAN 0 to HW filter on device team0 [ 2676.182491] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 04:34:12 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2676.236204] device team0 left promiscuous mode [ 2676.244909] device team_slave_0 left promiscuous mode [ 2676.268732] loop5: p1 < > p4 04:34:12 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2676.293308] loop5: partition table partially beyond EOD, truncated [ 2676.306217] loop5: p1 size 2 extends beyond EOD, truncated [ 2676.327018] device team_slave_1 left promiscuous mode [ 2676.334890] loop5: p4 start 1854537728 is beyond EOD, truncated 04:34:13 executing program 4: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x02roup.stap\x00', 0x2761, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000000)={r1, 0x0}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ioctl$sock_kcm_SIOCKCMATTACH(r1, 0x89e0, &(0x7f00000002c0)={r1, r1}) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) ioctl$TUNSETTXFILTER(0xffffffffffffffff, 0x400454d1, &(0x7f0000000080)=ANY=[@ANYBLOB="00ffffffff"]) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0xc0c0583b, 0x20000001) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000580)='/\x02roup.stap\x00') ioctl$PERF_EVENT_IOC_RESET(0xffffffffffffffff, 0x2403, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x100000000, 0x5, 0x4, 0x1, r1, 0x1000}, 0x2c) ioctl$sock_kcm_SIOCKCMATTACH(0xffffffffffffffff, 0x89e0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r1, 0x50, &(0x7f00000003c0)}, 0x10) perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0xe3db, 0x7fff, 0x5, 0x1e03, 0x0, 0x2207, 0x20, 0x7, 0xf1, 0x7f, 0x4, 0x7, 0xffffffffffff7fff, 0x1f, 0x4, 0x2, 0x4, 0x1f, 0x1, 0x80000001, 0x80000000, 0xb03, 0xe6, 0x0, 0x0, 0xfffffffffffffffc, 0xf, 0xffffffff, 0x2, 0x8, 0x2, 0xff, 0x421e6e12, 0xfff, 0x8000, 0x0, 0x0, 0x80, 0x1, @perf_bp={0x0, 0x2}, 0x0, 0xd1, 0x4, 0x7, 0x7, 0x7f, 0xfffffffffffffffb}, 0xffffffffffffffff, 0xe, r1, 0x2) [ 2676.399195] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 2676.489929] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 2676.527576] device team0 left promiscuous mode 04:34:13 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700006000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2676.580357] device team_slave_0 left promiscuous mode [ 2676.627103] device team_slave_1 left promiscuous mode 04:34:13 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000008128b14754000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:34:13 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:34:13 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setpipe(r1, 0x407, 0x8000e) splice(r0, 0x0, r2, 0x0, 0x55aa40ba, 0x0) [ 2676.816720] Dev loop1: unable to read RDB block 1 [ 2676.840206] loop1: unable to read partition table 04:34:13 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{0x0}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2676.871307] loop1: partition table beyond EOD, truncated [ 2676.895488] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 04:34:13 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setpipe(r1, 0x407, 0x8000e) splice(r0, 0x0, r2, 0x0, 0x55aa40ba, 0x0) 04:34:13 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:34:13 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3dc, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2677.035135] loop5: p1 < > p4 [ 2677.051602] device team0 entered promiscuous mode [ 2677.056636] loop5: partition table partially beyond EOD, truncated [ 2677.058679] loop5: p1 size 2 extends beyond EOD, truncated [ 2677.073229] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 04:34:13 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setpipe(r1, 0x407, 0x8000e) splice(r0, 0x0, r2, 0x0, 0x55aa40ba, 0x0) [ 2677.106152] device team_slave_0 entered promiscuous mode [ 2677.128773] device team_slave_1 entered promiscuous mode 04:34:13 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700006300000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2677.193418] loop5: p4 start 1854537728 is beyond EOD, truncated [ 2677.198075] 8021q: adding VLAN 0 to HW filter on device team0 04:34:13 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{0x0}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:34:14 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setpipe(r1, 0x407, 0x8000e) splice(r0, 0x0, r2, 0x0, 0x55aa40ba, 0x0) 04:34:14 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2677.413839] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 2677.492740] device team0 left promiscuous mode [ 2677.510637] device team_slave_0 left promiscuous mode [ 2677.550631] device team_slave_1 left promiscuous mode 04:34:14 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000008128b14755000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:34:14 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:34:14 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) splice(r0, 0x0, r1, 0x0, 0x55aa40ba, 0x0) [ 2677.704810] Dev loop1: unable to read RDB block 1 [ 2677.719716] loop1: unable to read partition table 04:34:14 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fa, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2677.753353] loop1: partition table beyond EOD, truncated [ 2677.772948] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 04:34:14 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{0x0}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2677.817220] device team0 entered promiscuous mode 04:34:14 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) splice(r0, 0x0, r1, 0x0, 0x55aa40ba, 0x0) [ 2677.858205] device team_slave_0 entered promiscuous mode [ 2677.868143] device team_slave_1 entered promiscuous mode [ 2677.912939] 8021q: adding VLAN 0 to HW filter on device team0 [ 2677.929847] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 2677.951906] device team0 entered promiscuous mode 04:34:14 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) splice(r0, 0x0, r1, 0x0, 0x55aa40ba, 0x0) 04:34:14 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2677.973250] device team_slave_0 entered promiscuous mode [ 2678.006723] device team_slave_1 entered promiscuous mode [ 2678.018165] loop5: p1 < > p4 [ 2678.041925] loop5: partition table partially beyond EOD, truncated [ 2678.074457] 8021q: adding VLAN 0 to HW filter on device team0 04:34:14 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700006800000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:34:14 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:34:14 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x8000e) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x55aa40ba, 0x0) [ 2678.097691] loop5: p1 size 2 extends beyond EOD, truncated [ 2678.125317] device team0 left promiscuous mode [ 2678.141715] device team_slave_0 left promiscuous mode [ 2678.157596] device team_slave_1 left promiscuous mode [ 2678.171834] loop5: p4 start 1854537728 is beyond EOD, truncated 04:34:14 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2678.314927] device team0 left promiscuous mode [ 2678.341502] device team_slave_0 left promiscuous mode [ 2678.352817] device team_slave_1 left promiscuous mode [ 2678.371277] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 2678.434653] Dev loop1: unable to read RDB block 1 [ 2678.508567] loop1: unable to read partition table [ 2678.530557] loop1: partition table beyond EOD, truncated [ 2678.559371] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 04:34:15 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000008128b14757000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:34:15 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x8000e) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x55aa40ba, 0x0) 04:34:15 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:34:15 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:34:15 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:34:15 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x8000e) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x55aa40ba, 0x0) [ 2678.702301] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 04:34:15 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setpipe(r0, 0x407, 0x8000e) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x55aa40ba, 0x0) [ 2678.790190] device team0 entered promiscuous mode [ 2678.795106] device team_slave_0 entered promiscuous mode [ 2678.814057] device team_slave_1 entered promiscuous mode [ 2678.895748] 8021q: adding VLAN 0 to HW filter on device team0 04:34:15 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700006c00000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:34:15 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:34:15 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:34:15 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setpipe(r0, 0x407, 0x8000e) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x55aa40ba, 0x0) [ 2678.989535] loop5: p1 < > p4 [ 2679.007136] loop5: partition table partially beyond EOD, truncated [ 2679.018972] loop5: p1 size 2 extends beyond EOD, truncated 04:34:15 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2679.089071] loop5: p4 start 1854537728 is beyond EOD, truncated [ 2679.119316] device team0 left promiscuous mode [ 2679.158439] device team_slave_0 left promiscuous mode [ 2679.217856] device team_slave_1 left promiscuous mode [ 2679.295055] Dev loop1: unable to read RDB block 1 [ 2679.315443] loop1: unable to read partition table 04:34:16 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000008128b14760000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:34:16 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setpipe(r0, 0x407, 0x8000e) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x55aa40ba, 0x0) [ 2679.346853] loop1: partition table beyond EOD, truncated [ 2679.374471] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 04:34:16 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2679.450451] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 04:34:16 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setpipe(r1, 0x407, 0x8000e) splice(r0, 0x0, r2, 0x0, 0x55aa40ba, 0x0) [ 2679.611509] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 04:34:16 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setpipe(r1, 0x407, 0x8000e) splice(r0, 0x0, r2, 0x0, 0x55aa40ba, 0x0) 04:34:16 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:34:16 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700007400000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:34:16 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:34:16 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000008128b14763000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:34:16 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:34:16 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setpipe(r1, 0x407, 0x8000e) splice(r0, 0x0, r2, 0x0, 0x55aa40ba, 0x0) [ 2679.857431] device team0 entered promiscuous mode [ 2679.867364] device team_slave_0 entered promiscuous mode [ 2679.880003] device team_slave_1 entered promiscuous mode [ 2679.973156] 8021q: adding VLAN 0 to HW filter on device team0 [ 2679.982797] Dev loop1: unable to read RDB block 1 [ 2680.007480] loop1: unable to read partition table 04:34:16 executing program 4: r0 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setpipe(r1, 0x407, 0x8000e) splice(r0, 0x0, r2, 0x0, 0x55aa40ba, 0x0) [ 2680.030484] loop1: partition table beyond EOD, truncated [ 2680.062573] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 04:34:16 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2680.127530] loop5: p1 < > p4 04:34:16 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x0, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:34:16 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:34:16 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) pipe2$9p(0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x8000e) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x55aa40ba, 0x0) [ 2680.156354] loop5: partition table partially beyond EOD, truncated [ 2680.178827] loop5: p1 size 2 extends beyond EOD, truncated [ 2680.200024] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 2680.217730] device team0 entered promiscuous mode [ 2680.240950] loop5: p4 start 1854537728 is beyond EOD, truncated [ 2680.262217] device team_slave_0 entered promiscuous mode [ 2680.297405] device team_slave_1 entered promiscuous mode 04:34:16 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) pipe2$9p(0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x8000e) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x55aa40ba, 0x0) 04:34:17 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700007a00000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2680.399912] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 2680.413305] 8021q: adding VLAN 0 to HW filter on device team0 04:34:17 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2200, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:34:17 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2680.466650] device team0 left promiscuous mode [ 2680.476899] device team_slave_0 left promiscuous mode [ 2680.483535] device team_slave_1 left promiscuous mode [ 2680.595219] device team0 left promiscuous mode [ 2680.612052] device team_slave_0 left promiscuous mode 04:34:17 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000008128b14768000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:34:17 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) pipe2$9p(0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x8000e) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x55aa40ba, 0x0) [ 2680.646226] device team_slave_1 left promiscuous mode [ 2680.752068] Dev loop1: unable to read RDB block 1 04:34:17 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x8000e) splice(r0, 0x0, r1, 0x0, 0x55aa40ba, 0x0) 04:34:17 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2680.777524] loop1: unable to read partition table 04:34:17 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2602, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2680.835766] loop1: partition table beyond EOD, [ 2680.841544] truncated [ 2680.860665] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) [ 2680.902773] device team0 entered promiscuous mode 04:34:17 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x8000e) splice(r0, 0x0, r1, 0x0, 0x55aa40ba, 0x0) 04:34:17 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2", 0x2c}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2680.941538] loop5: p1 < > p4 [ 2680.950702] device team_slave_0 entered promiscuous mode [ 2680.964559] loop5: partition table partially beyond EOD, truncated [ 2680.975494] device team_slave_1 entered promiscuous mode [ 2680.999982] loop5: p1 size 2 extends beyond EOD, truncated [ 2681.000765] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 2681.046499] loop5: p4 start 1854537728 is beyond EOD, truncated [ 2681.089255] 8021q: adding VLAN 0 to HW filter on device team0 04:34:17 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x8000e) splice(r0, 0x0, r1, 0x0, 0x55aa40ba, 0x0) [ 2681.130724] device team0 entered promiscuous mode [ 2681.135745] device team_slave_0 entered promiscuous mode [ 2681.165576] device team_slave_1 entered promiscuous mode [ 2681.205569] Dev loop1: unable to read RDB block 1 [ 2681.214978] loop1: unable to read partition table [ 2681.229061] 8021q: adding VLAN 0 to HW filter on device team0 [ 2681.243170] loop1: partition table beyond EOD, truncated 04:34:17 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3400, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2681.256157] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 2681.283517] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 04:34:17 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff07000fff00000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:34:17 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:34:17 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setpipe(r1, 0x407, 0x0) splice(r0, 0x0, r2, 0x0, 0x55aa40ba, 0x0) [ 2681.430794] device team0 left promiscuous mode [ 2681.449485] device team_slave_0 left promiscuous mode [ 2681.475995] device team_slave_1 left promiscuous mode [ 2681.515938] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 04:34:18 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000008128b1476c000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:34:18 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2", 0x2c}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:34:18 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2681.671528] device team0 left promiscuous mode [ 2681.704160] device team_slave_0 left promiscuous mode 04:34:18 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setpipe(r1, 0x407, 0x0) splice(r0, 0x0, r2, 0x0, 0x55aa40ba, 0x0) 04:34:18 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2681.731185] device team_slave_1 left promiscuous mode [ 2681.757196] Dev loop1: unable to read RDB block 1 [ 2681.775685] loop1: unable to read partition table 04:34:18 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setpipe(r1, 0x407, 0x0) splice(r0, 0x0, r2, 0x0, 0x55aa40ba, 0x0) [ 2681.806960] loop1: partition table beyond EOD, truncated [ 2681.816150] loop_reread_partitions: partition scan of loop1 () failed (rc=-5) 04:34:18 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2681.904421] loop5: p1 < > p4 [ 2681.913293] device team0 entered promiscuous mode [ 2681.927680] loop5: partition table partially beyond EOD, truncated [ 2681.942255] device team_slave_0 entered promiscuous mode 04:34:18 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setpipe(r0, 0x407, 0x8000e) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x55aa40ba, 0x0) 04:34:18 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2", 0x2c}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2681.970316] loop5: p1 size 2 extends beyond EOD, truncated [ 2681.976927] device team_slave_1 entered promiscuous mode [ 2682.001027] loop5: p4 start 1854537728 is beyond EOD, truncated [ 2682.024746] 8021q: adding VLAN 0 to HW filter on device team0 [ 2682.060075] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 2682.116771] device team0 entered promiscuous mode [ 2682.140834] device team_slave_0 entered promiscuous mode [ 2682.151029] device team_slave_1 entered promiscuous mode [ 2682.169662] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 04:34:18 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000002000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:34:18 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setpipe(r0, 0x407, 0x8000e) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x55aa40ba, 0x0) 04:34:18 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2682.276834] 8021q: adding VLAN 0 to HW filter on device team0 [ 2682.285445] loop5: p1 < > p4 [ 2682.289285] loop5: partition table partially beyond EOD, truncated [ 2682.309854] loop5: p1 size 2 extends beyond EOD, truncated [ 2682.319306] loop5: p4 start 1854537728 is beyond EOD, truncated [ 2682.357505] device team0 left promiscuous mode [ 2682.367099] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 2682.378089] device team_slave_0 left promiscuous mode [ 2682.399949] device team_slave_1 left promiscuous mode 04:34:19 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6600, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:34:19 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000008128b14774000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:34:19 executing program 4: openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setpipe(r0, 0x407, 0x8000e) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x55aa40ba, 0x0) 04:34:19 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cb", 0x33}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2682.523668] loop1: p1 < > p4 [ 2682.536184] loop1: partition table partially beyond EOD, truncated [ 2682.565836] loop1: p1 size 2 extends beyond EOD, truncated 04:34:19 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) fcntl$setpipe(r1, 0x407, 0x8000e) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x55aa40ba, 0x0) [ 2682.615064] device team0 left promiscuous mode [ 2682.618127] loop1: p4 start 1854537728 is beyond EOD, truncated [ 2682.632301] device team_slave_0 left promiscuous mode [ 2682.664144] loop5: p1 < > p4 [ 2682.681306] device team_slave_1 left promiscuous mode [ 2682.707123] loop5: partition table partially beyond EOD, truncated [ 2682.750507] loop5: p1 size 2 extends beyond EOD, truncated [ 2682.776409] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 04:34:19 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:34:19 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) fcntl$setpipe(r1, 0x407, 0x8000e) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x55aa40ba, 0x0) 04:34:19 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2682.847102] loop5: p4 start 1854537728 is beyond EOD, truncated 04:34:19 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000003000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:34:19 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff}, 0x0) fcntl$setpipe(r1, 0x407, 0x8000e) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x55aa40ba, 0x0) 04:34:19 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cb", 0x33}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2682.947821] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 2682.997996] device team0 entered promiscuous mode [ 2683.040934] device team_slave_0 entered promiscuous mode [ 2683.070923] device team_slave_1 entered promiscuous mode 04:34:19 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setpipe(r1, 0x407, 0x8000e) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) [ 2683.135266] 8021q: adding VLAN 0 to HW filter on device team0 04:34:19 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6e00, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:34:19 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000008128b1477a000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:34:19 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setpipe(r1, 0x407, 0x8000e) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) 04:34:19 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2683.298707] loop1: p1 < > p4 [ 2683.307104] loop1: partition table partially beyond EOD, truncated [ 2683.332160] loop1: p1 size 2 extends beyond EOD, truncated 04:34:19 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cb", 0x33}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:34:20 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setpipe(r1, 0x407, 0x8000e) splice(r0, 0x0, r2, 0x0, 0x0, 0x0) [ 2683.364968] device team0 left promiscuous mode [ 2683.375607] loop1: p4 start 1854537728 is beyond EOD, truncated [ 2683.398727] device team_slave_0 left promiscuous mode [ 2683.445519] loop5: p1 < > p4 [ 2683.454851] device team_slave_1 left promiscuous mode [ 2683.463191] loop5: partition table partially beyond EOD, truncated 04:34:20 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80003, 0xc) write(r0, &(0x7f00000000c0)="1f0000000102fffffd3b54c007110000f30501000b000600000423ca310000", 0x1f) [ 2683.490797] loop5: p1 size 2 extends beyond EOD, truncated [ 2683.545320] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 2683.545562] loop5: p4 start 1854537728 is beyond EOD, truncated 04:34:20 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa403, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2683.664547] loop1: p1 < > p4 [ 2683.668602] loop1: partition table partially beyond EOD, truncated [ 2683.694328] loop1: p1 size 2 extends beyond EOD, truncated [ 2683.705202] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 2683.747577] loop1: p4 start 1854537728 is beyond EOD, truncated 04:34:20 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000010000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:34:20 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'aead\x00', 0x0, 0x0, 'pcrypt(gcm_base(ctr(aes-aesni),ghash-generic))\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0x0) getsockopt$sock_int(r1, 0x1, 0x29, 0x0, &(0x7f0000000240)) 04:34:20 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0", 0x37}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:34:20 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, 0x0, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:34:20 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000008128b14788020000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2683.903052] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 2683.903385] device team0 entered promiscuous mode [ 2683.927180] device team_slave_0 entered promiscuous mode 04:34:20 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc003, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2683.955764] device team_slave_1 entered promiscuous mode 04:34:20 executing program 4: mknod$loop(&(0x7f0000000100)='./file0\x00', 0xa, 0xffffffffffffffff) r0 = creat(&(0x7f0000000080)='./file0\x00', 0x0) write$binfmt_script(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB=','], 0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x2000001000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 2684.009409] 8021q: adding VLAN 0 to HW filter on device team0 04:34:20 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0", 0x37}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:34:20 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, 0x0, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:34:20 executing program 4: clone(0x10062101, 0x0, 0x0, 0x0, 0x0) [ 2684.165495] loop1: p1 < > p4 [ 2684.173196] loop1: partition table partially beyond EOD, truncated [ 2684.191101] loop1: p1 size 2 extends beyond EOD, truncated 04:34:20 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd003, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2684.238987] loop1: p4 start 1854537728 is beyond EOD, truncated [ 2684.275705] loop5: p1 < > p4 [ 2684.282508] device team0 left promiscuous mode 04:34:20 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f3188b070") r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/tcp\x00') sendfile(r0, r2, 0x0, 0x800000bf) [ 2684.284532] loop5: partition table partially beyond EOD, truncated [ 2684.306106] device team_slave_0 left promiscuous mode [ 2684.324448] loop5: p1 size 2 extends beyond EOD, truncated [ 2684.341183] device team_slave_1 left promiscuous mode [ 2684.376855] loop5: p4 start 1854537728 is beyond EOD, truncated [ 2684.402634] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 2684.403030] print_req_error: 1 callbacks suppressed [ 2684.403042] print_req_error: I/O error, dev loop1, sector 0 flags 80700 04:34:21 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000020000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:34:21 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000008128b147b0020000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:34:21 executing program 4: gettid() mkdir(&(0x7f0000000140)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, &(0x7f0000000140)) chdir(&(0x7f0000000180)='./file0\x00') r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x4) mmap(&(0x7f00006ff000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$UHID_INPUT(r0, &(0x7f0000001440)={0x8, "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", 0x1000}, 0xfffffc41) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCNOTTY(0xffffffffffffffff, 0x5422) fadvise64(r0, 0x0, 0x0, 0x4) 04:34:21 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdc03, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:34:21 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0", 0x37}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2684.601590] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 2684.715624] device team0 entered promiscuous mode [ 2684.735155] device team_slave_0 entered promiscuous mode 04:34:21 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, 0x0, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2684.763743] device team_slave_1 entered promiscuous mode [ 2684.860431] 8021q: adding VLAN 0 to HW filter on device team0 04:34:21 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe801, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2684.931253] loop1: p1 < > p4 [ 2684.945236] loop1: partition table partially beyond EOD, truncated [ 2684.956237] device team0 entered promiscuous mode [ 2684.969727] loop1: p1 size 2 extends beyond EOD, truncated 04:34:21 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad06682", 0x39}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:34:21 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000008128b14700030000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2685.007345] device team_slave_0 entered promiscuous mode [ 2685.019076] loop1: p4 start 1854537728 is beyond EOD, truncated [ 2685.046522] device team_slave_1 entered promiscuous mode [ 2685.130046] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 2685.140908] 8021q: adding VLAN 0 to HW filter on device team0 04:34:21 executing program 4: unshare(0x8020000) clone(0x10062101, 0x0, 0x0, 0x0, 0x0) [ 2685.203973] device team0 left promiscuous mode 04:34:21 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:34:21 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf003, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2685.228539] device team_slave_0 left promiscuous mode [ 2685.264517] device team_slave_1 left promiscuous mode 04:34:21 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000030000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2685.339169] loop5: p1 < > p4 [ 2685.342796] loop5: partition table partially beyond EOD, truncated [ 2685.368295] device team0 left promiscuous mode [ 2685.398575] device team_slave_0 left promiscuous mode [ 2685.412135] loop5: p1 size 2 extends beyond EOD, truncated [ 2685.445274] device team_slave_1 left promiscuous mode [ 2685.447376] loop5: p4 start 1854537728 is beyond EOD, truncated 04:34:22 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) write$capi20(r0, &(0x7f0000000300)={0x10, 0x9}, 0xc) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, 0x0, 0x0) rseq(0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000580)=@sack_info={0x0, 0x6, 0x7ff}, &(0x7f00000005c0)=0xc) syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) preadv(r1, &(0x7f00000017c0), 0x3da, 0x0) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, &(0x7f0000000380)) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0445609, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) syz_open_dev$sndtimer(0x0, 0x0, 0x0) [ 2685.533036] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 04:34:22 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfa03, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:34:22 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad06682", 0x39}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2685.700766] loop1: p1 < > p4 [ 2685.706161] loop1: partition table partially beyond EOD, truncated 04:34:22 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000008128b147a0030000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2685.777949] loop1: p1 size 2 extends beyond EOD, truncated [ 2685.833788] loop1: p4 start 1854537728 is beyond EOD, truncated [ 2685.896805] device team0 entered promiscuous mode 04:34:22 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:34:22 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/kcm\x00\b\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) write$capi20(r0, &(0x7f0000000300)={0x10, 0x9}, 0xc) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, 0x0, 0x0) rseq(0x0, 0x0, 0x0, 0x0) r2 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f0000000580)=@sack_info={0x0, 0x6, 0x7ff}, &(0x7f00000005c0)=0xc) syz_open_dev$vbi(0x0, 0xffffffffffffffff, 0x2) preadv(r1, &(0x7f00000017c0), 0x3da, 0x0) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, 0x0, &(0x7f0000000380)) ioctl$VIDIOC_QUERYBUF(0xffffffffffffffff, 0xc0445609, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) syz_open_dev$sndtimer(0x0, 0x0, 0x0) [ 2685.928474] device team_slave_0 entered promiscuous mode [ 2685.939312] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 2685.964381] device team_slave_1 entered promiscuous mode 04:34:22 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2686.060549] 8021q: adding VLAN 0 to HW filter on device team0 [ 2686.150474] loop5: p1 < > p4 [ 2686.165315] loop5: partition table partially beyond EOD, truncated [ 2686.174191] device team0 entered promiscuous mode 04:34:22 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000040000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:34:22 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad06682", 0x39}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2686.215696] device team_slave_0 entered promiscuous mode [ 2686.216412] loop5: p1 size 2 extends beyond EOD, truncated [ 2686.231745] device team_slave_1 entered promiscuous mode 04:34:22 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000840)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time={0x77359400}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000280)={{0xfff}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f0000000340)={0x0, 0x0, 'client1\x00', 0x0, "c2cdedb041b1e4ff", "e77af0bc275d4e83bfd556d02a6668a1a3d4dcd7bfb548f1cfe96bde4e6c1b23"}) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x1000000000013) [ 2686.293811] loop5: p4 start 1854537728 is beyond EOD, truncated [ 2686.311770] 8021q: adding VLAN 0 to HW filter on device team0 [ 2686.379758] device team0 left promiscuous mode [ 2686.390960] device team_slave_0 left promiscuous mode [ 2686.410765] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 04:34:23 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:34:23 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2686.433486] device team_slave_1 left promiscuous mode 04:34:23 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000008128b14700050000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2686.541201] device team0 left promiscuous mode [ 2686.549608] device team_slave_0 left promiscuous mode [ 2686.554837] loop1: p1 < > p4 [ 2686.568182] loop1: partition table partially beyond EOD, truncated [ 2686.569463] device team_slave_1 left promiscuous mode 04:34:23 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2686.603788] loop1: p1 size 2 extends beyond EOD, truncated [ 2686.653834] loop1: p4 start 1854537728 is beyond EOD, truncated 04:34:23 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:34:23 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x0, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2686.730055] device team0 entered promiscuous mode [ 2686.736494] device team_slave_0 entered promiscuous mode [ 2686.766665] device team_slave_1 entered promiscuous mode [ 2686.828279] loop5: p1 < > p4 [ 2686.852616] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 2686.853195] 8021q: adding VLAN 0 to HW filter on device team0 [ 2686.867689] loop5: partition table partially beyond EOD, truncated [ 2686.900069] device team0 entered promiscuous mode [ 2686.900110] loop5: p1 size 2 extends beyond EOD, truncated [ 2686.932784] device team_slave_0 entered promiscuous mode 04:34:23 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000050000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:34:23 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2686.962206] device team_slave_1 entered promiscuous mode [ 2686.970633] loop5: p4 start 1854537728 is beyond EOD, truncated [ 2687.038588] 8021q: adding VLAN 0 to HW filter on device team0 [ 2687.063865] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 2687.082434] device team0 left promiscuous mode [ 2687.091512] device team_slave_0 left promiscuous mode [ 2687.112637] device team_slave_1 left promiscuous mode 04:34:23 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x0, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:34:23 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:34:23 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000840)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time={0x77359400}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000280)={{0xfff}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f0000000340)={0x0, 0x0, 'client1\x00', 0x0, "c2cdedb041b1e4ff", "e77af0bc275d4e83bfd556d02a6668a1a3d4dcd7bfb548f1cfe96bde4e6c1b23"}) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x1000000000013) [ 2687.247701] loop1: p1 < > p4 [ 2687.260841] loop1: partition table partially beyond EOD, truncated 04:34:23 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000008128b14700060000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2687.297159] loop1: p1 size 2 extends beyond EOD, truncated [ 2687.303429] device team0 left promiscuous mode [ 2687.335097] device team_slave_0 left promiscuous mode 04:34:23 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2687.355290] loop1: p4 start 1854537728 is beyond EOD, truncated [ 2687.373608] device team_slave_1 left promiscuous mode [ 2687.451918] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 04:34:24 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:34:24 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000060000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2687.577113] device team0 entered promiscuous mode [ 2687.593461] loop5: p1 < > p4 [ 2687.616957] loop5: partition table partially beyond EOD, truncated [ 2687.625802] device team_slave_0 entered promiscuous mode [ 2687.638230] loop5: p1 size 2 extends beyond EOD, truncated [ 2687.668372] device team_slave_1 entered promiscuous mode [ 2687.683983] loop5: p4 start 1854537728 is beyond EOD, truncated [ 2687.732317] 8021q: adding VLAN 0 to HW filter on device team0 [ 2687.796255] loop_reread_partitions: partition scan of loop1 () failed (rc=-16) 04:34:24 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:34:24 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x0, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee", 0x1d}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:34:24 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2687.845127] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 2687.930305] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 2687.960978] device team0 entered promiscuous mode [ 2687.974503] device team_slave_0 entered promiscuous mode 04:34:24 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000008128b14700070000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2687.983104] device team_slave_1 entered promiscuous mode [ 2688.035180] 8021q: adding VLAN 0 to HW filter on device team0 [ 2688.067220] device team0 left promiscuous mode 04:34:24 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000070000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2688.086872] device team_slave_0 left promiscuous mode 04:34:24 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2688.135090] device team_slave_1 left promiscuous mode 04:34:24 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000840)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time={0x77359400}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000280)={{0xfff}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f0000000340)={0x0, 0x0, 'client1\x00', 0x0, "c2cdedb041b1e4ff", "e77af0bc275d4e83bfd556d02a6668a1a3d4dcd7bfb548f1cfe96bde4e6c1b23"}) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x1000000000013) 04:34:24 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, 0x0}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2688.276575] loop5: p1 < > p4 [ 2688.306315] loop5: partition table partially beyond EOD, truncated [ 2688.337786] loop5: p1 size 2 extends beyond EOD, [ 2688.337811] truncated [ 2688.375394] loop5: p4 start 1854537728 is beyond EOD, truncated [ 2688.429763] device team0 left promiscuous mode [ 2688.434479] device team_slave_0 left promiscuous mode 04:34:25 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2688.500091] device team_slave_1 left promiscuous mode 04:34:25 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000090000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2688.570458] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 2688.618979] device team0 entered promiscuous mode 04:34:25 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2688.640160] device team_slave_0 entered promiscuous mode [ 2688.677380] device team_slave_1 entered promiscuous mode [ 2688.760819] 8021q: adding VLAN 0 to HW filter on device team0 04:34:25 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000008128b14700090000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:34:25 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, 0x0}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:34:25 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2688.921308] loop1: p1 < > p4 [ 2688.932467] loop1: partition table partially beyond EOD, truncated [ 2688.938589] device team0 entered promiscuous mode [ 2688.944190] device team_slave_0 entered promiscuous mode [ 2688.957787] loop1: p1 size 2 extends beyond EOD, truncated [ 2688.967099] device team_slave_1 entered promiscuous mode [ 2688.989860] loop1: p4 start 1854537728 is beyond EOD, truncated 04:34:25 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2689.022161] 8021q: adding VLAN 0 to HW filter on device team0 [ 2689.093954] device team0 left promiscuous mode [ 2689.106719] loop5: p1 < > p4 [ 2689.122354] device team_slave_0 left promiscuous mode [ 2689.128318] loop5: partition table partially beyond EOD, truncated 04:34:25 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000840)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time={0x77359400}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000280)={{0xfff}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f0000000340)={0x0, 0x0, 'client1\x00', 0x0, "c2cdedb041b1e4ff", "e77af0bc275d4e83bfd556d02a6668a1a3d4dcd7bfb548f1cfe96bde4e6c1b23"}) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) tkill(r1, 0x1000000000013) 04:34:25 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, 0x0}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:34:25 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff070041a9e50b0000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2689.146364] device team_slave_1 left promiscuous mode [ 2689.161725] loop5: p1 size 2 extends beyond EOD, truncated [ 2689.222644] loop5: p4 start 1854537728 is beyond EOD, truncated [ 2689.327341] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 2689.341760] device team0 left promiscuous mode [ 2689.363064] device team_slave_0 left promiscuous mode 04:34:26 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff07000000000f0000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:34:26 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2689.376724] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 2689.403473] device team_slave_1 left promiscuous mode 04:34:26 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:34:26 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000008128b147000f0000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2689.618687] device team0 entered promiscuous mode [ 2689.641062] device team_slave_0 entered promiscuous mode [ 2689.652396] device team_slave_1 entered promiscuous mode 04:34:26 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2689.729991] 8021q: adding VLAN 0 to HW filter on device team0 [ 2689.738605] loop1: p1 < > p4 [ 2689.758419] loop1: partition table partially beyond EOD, truncated 04:34:26 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2689.788237] loop1: p1 size 2 extends beyond EOD, truncated [ 2689.809407] loop5: p1 < > p4 [ 2689.823195] loop5: partition table partially beyond EOD, truncated [ 2689.843168] loop1: p4 start 1854537728 is beyond EOD, truncated [ 2689.858248] loop5: p1 size 2 extends beyond EOD, truncated 04:34:26 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2689.891451] device team0 entered promiscuous mode [ 2689.897856] loop5: p4 start 1854537728 is beyond EOD, truncated [ 2689.912913] device team_slave_0 entered promiscuous mode [ 2689.928581] device team_slave_1 entered promiscuous mode [ 2689.949631] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 2689.970653] 8021q: adding VLAN 0 to HW filter on device team0 [ 2690.006376] device team0 left promiscuous mode [ 2690.015260] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 2690.024306] device team_slave_0 left promiscuous mode 04:34:26 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:34:26 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000840)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time={0x77359400}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000280)={{0xfff}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f0000000340)={0x0, 0x0, 'client1\x00', 0x0, "c2cdedb041b1e4ff", "e77af0bc275d4e83bfd556d02a6668a1a3d4dcd7bfb548f1cfe96bde4e6c1b23"}) gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) 04:34:26 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2690.051628] device team_slave_1 left promiscuous mode 04:34:26 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000100000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2690.190784] device team0 left promiscuous mode [ 2690.214113] device team_slave_0 left promiscuous mode 04:34:26 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000008128b1471d0f0000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2690.259866] device team_slave_1 left promiscuous mode [ 2690.479260] loop1: p1 < > p4 04:34:27 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:34:27 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2690.508300] loop1: partition table partially beyond EOD, truncated [ 2690.530482] loop1: p1 size 2 extends beyond EOD, truncated [ 2690.558409] loop1: p4 start 1854537728 is beyond EOD, truncated [ 2690.599895] loop5: p1 < > p4 [ 2690.603276] loop5: partition table partially beyond EOD, truncated [ 2690.679868] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 2690.687526] loop5: p1 size 2 extends beyond EOD, truncated 04:34:27 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2690.742380] loop5: p4 start 1854537728 is beyond EOD, truncated 04:34:27 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2690.832922] device team0 entered promiscuous mode [ 2690.840792] loop1: p1 < > p4 [ 2690.844147] loop1: partition table partially beyond EOD, truncated [ 2690.857667] device team_slave_0 entered promiscuous mode [ 2690.863486] loop1: p1 size 2 extends beyond EOD, truncated [ 2690.871689] device team_slave_1 entered promiscuous mode 04:34:27 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2690.883841] loop1: p4 start 1854537728 is beyond EOD, truncated [ 2690.893956] __loop_clr_fd: partition scan of loop5 failed (rc=-22) 04:34:27 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff070000000f1d0000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:34:27 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000840)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time={0x77359400}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000280)={{0xfff}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f0000000340)={0x0, 0x0, 'client1\x00', 0x0, "c2cdedb041b1e4ff", "e77af0bc275d4e83bfd556d02a6668a1a3d4dcd7bfb548f1cfe96bde4e6c1b23"}) gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) [ 2690.981457] 8021q: adding VLAN 0 to HW filter on device team0 04:34:27 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:34:27 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2691.111133] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 04:34:27 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{0x0}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:34:27 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000008128b1470f1d0000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:34:27 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2691.241043] device team0 left promiscuous mode [ 2691.274266] device team_slave_0 left promiscuous mode [ 2691.282940] device team_slave_1 left promiscuous mode [ 2691.344319] loop1: p1 < > p4 [ 2691.395473] loop1: partition table partially beyond EOD, truncated 04:34:28 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2691.455966] loop1: p1 size 2 extends beyond EOD, truncated [ 2691.482773] loop5: p1 < > p4 [ 2691.486041] loop5: partition table partially beyond EOD, truncated 04:34:28 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, 0x0) [ 2691.505759] loop1: p4 start 1854537728 is beyond EOD, truncated [ 2691.518139] loop5: p1 size 2 extends beyond EOD, truncated [ 2691.531632] loop5: p4 start 1854537728 is beyond EOD, truncated [ 2691.605459] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 04:34:28 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, 0x0) 04:34:28 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000008128b147001f0000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:34:28 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{0x0}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2691.777928] loop1: p1 < > p4 [ 2691.781072] loop1: partition table partially beyond EOD, truncated [ 2691.820593] loop1: p1 size 2 extends beyond EOD, truncated [ 2691.827460] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 2691.854862] loop1: p4 start 1854537728 is beyond EOD, truncated [ 2691.867031] device team0 entered promiscuous mode [ 2691.872672] device team_slave_0 entered promiscuous mode [ 2691.883275] device team_slave_1 entered promiscuous mode 04:34:28 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff07000000001f0000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:34:28 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000840)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time={0x77359400}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000280)={{0xfff}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f0000000340)={0x0, 0x0, 'client1\x00', 0x0, "c2cdedb041b1e4ff", "e77af0bc275d4e83bfd556d02a6668a1a3d4dcd7bfb548f1cfe96bde4e6c1b23"}) gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) timer_settime(0x0, 0x0, &(0x7f0000000240)={{0x0, 0x1c9c380}, {0x0, 0x1c9c380}}, 0x0) 04:34:28 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22000000, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:34:28 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, 0x0) [ 2691.927711] 8021q: adding VLAN 0 to HW filter on device team0 04:34:28 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{0x0}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2692.042935] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 04:34:28 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff'}) 04:34:28 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x26020000, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2692.150961] loop5: p1 < > p4 [ 2692.160609] device team0 left promiscuous mode [ 2692.175529] loop5: partition table partially beyond EOD, truncated [ 2692.200172] device team_slave_0 left promiscuous mode [ 2692.209947] loop5: p1 size 2 extends beyond EOD, truncated [ 2692.238568] device team_slave_1 left promiscuous mode [ 2692.259223] loop5: p4 start 1854537728 is beyond EOD, truncated [ 2692.351962] loop1: p1 < > p4 [ 2692.359566] loop1: partition table partially beyond EOD, truncated [ 2692.374931] loop1: p1 size 2 extends beyond EOD, truncated 04:34:29 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2692.405126] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 2692.439401] loop1: p4 start 1854537728 is beyond EOD, truncated 04:34:29 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff'}) 04:34:29 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x34000000, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:34:29 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000008128b14700200000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2692.570244] device team0 entered promiscuous mode [ 2692.579971] device team_slave_0 entered promiscuous mode [ 2692.606210] __loop_clr_fd: partition scan of loop1 failed (rc=-22) [ 2692.617961] device team_slave_1 entered promiscuous mode 04:34:29 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000200000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2692.721906] 8021q: adding VLAN 0 to HW filter on device team0 04:34:29 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:34:29 executing program 4: r0 = syz_open_dev$sndseq(&(0x7f0000000180)='/dev/snd/seq\x00', 0x0, 0x0) read(r0, &(0x7f0000000840)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f0000000080)={0x200000000bd, @time={0x77359400}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000280)={{0xfff}}) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0bc5351, &(0x7f0000000340)={0x0, 0x0, 'client1\x00', 0x0, "c2cdedb041b1e4ff", "e77af0bc275d4e83bfd556d02a6668a1a3d4dcd7bfb548f1cfe96bde4e6c1b23"}) r1 = gettid() timer_create(0x0, &(0x7f0000000100)={0x0, 0x12}, &(0x7f00000001c0)) tkill(r1, 0x1000000000013) 04:34:29 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 2692.871028] loop5: p1 < > p4 [ 2692.874369] loop5: partition table partially beyond EOD, truncated [ 2692.925163] loop5: p1 size 2 extends beyond EOD, truncated [ 2692.951560] device team0 left promiscuous mode [ 2692.964516] device team_slave_0 left promiscuous mode [ 2692.996302] loop1: p1 < > p4 [ 2693.003515] loop5: p4 start 1854537728 is beyond EOD, truncated [ 2693.032581] device team_slave_1 left promiscuous mode [ 2693.044084] loop1: partition table partially beyond EOD, truncated 04:34:29 executing program 2: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)="2d01d5c02a9cb13d39a9456d755f20cfcc958fddab883bf37eb9e78eee7171b90ef915a8a1b50a5ea35358c2534db51a9001cbb2f38ad0668246", 0x3a}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff'}) [ 2693.104484] loop1: p1 size 2 extends beyond EOD, truncated [ 2693.137873] __loop_clr_fd: partition scan of loop5 failed (rc=-22) [ 2693.152626] loop1: p4 start 1854537728 is beyond EOD, truncated 04:34:29 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:34:30 executing program 5: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="0000680000050000ffffffa6000000008128b14700230000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) [ 2693.358089] __loop_clr_fd: partition scan of loop1 failed (rc=-22) 04:34:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x80003, 0xc) write(r0, &(0x7f00000000c0)="1f0000000102fffffd3b54c007110000f30501000b000600000423ca310000", 0x1f) 04:34:30 executing program 1: r0 = open(&(0x7f0000000a00)='./file1\x00', 0x0, 0x0) mkdirat(r0, 0x0, 0x0) open(&(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000940)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2) socketpair$unix(0x1, 0x0, 0x0, 0x0) add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0", 0x48, 0xfffffffffffffff9) syz_mount_image$hfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[]) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) r1 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000005000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000230000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) write(r2, 0x0, 0xfffffffffffffd12) syz_open_procfs(0x0, 0x0) add_key(0x0, &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0xff, 0x0, 0xad4f, 0x0, 0x2be, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, @perf_config_ext, 0x404}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$restrict_keyring(0x1d, r1, 0x0, 0x0) semget$private(0x0, 0x1, 0x400) ioctl$SG_NEXT_CMD_LEN(0xffffffffffffffff, 0x2283, &(0x7f00000000c0)=0x1f) 04:34:30 executing program 0: r0 = openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, 0x0) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000280), 0x4) r1 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00'}) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x103002, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f00000001c0)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r0}}, 0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x111, 0xb}}, 0x20) sendmsg$inet_sctp(r1, &(0x7f0000000440)={&(0x7f0000000200)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000300)=[{&(0x7f00000002c0)}], 0x1}, 0x8000) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000000c0)={0xa, 0x4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 04:34:30 executing program 3: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x1012, r0, 0x0) write$P9_RWALK(r0, &(0x7f0000000500)=ANY=[@ANYRESHEX], 0x12) write$nbd(r0, &(0x7f0000000100)=ANY=[@ANYRES32], 0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x66000000, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2693.540429] device team0 entered promiscuous mode [ 2693.556381] device team_slave_0 entered promiscuous mode [ 2693.568540] device team_slave_1 entered promiscuous mode [ 2693.628567] 8021q: adding VLAN 0 to HW filter on device team0 [ 2693.709208] ================================================================== [ 2693.717038] BUG: KASAN: use-after-free in disk_map_sector_rcu+0x475/0x490 [ 2693.723997] Read of size 8 at addr ffff8880954f3640 by task blkid/4125 [ 2693.730656] [ 2693.732298] CPU: 0 PID: 4125 Comm: blkid Not tainted 5.0.0+ #11 [ 2693.738411] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2693.748033] Call Trace: [ 2693.750643] dump_stack+0x172/0x1f0 [ 2693.754294] ? disk_map_sector_rcu+0x475/0x490 [ 2693.758919] print_address_description.cold+0x7c/0x20d [ 2693.764225] ? disk_map_sector_rcu+0x475/0x490 [ 2693.768826] ? disk_map_sector_rcu+0x475/0x490 [ 2693.773422] kasan_report.cold+0x1b/0x40 [ 2693.777511] ? disk_map_sector_rcu+0x475/0x490 [ 2693.782108] __asan_report_load8_noabort+0x14/0x20 [ 2693.782154] disk_map_sector_rcu+0x475/0x490 [ 2693.782175] ? kasan_check_read+0x11/0x20 [ 2693.782243] blk_account_io_start+0x507/0xcf0 [ 2693.782261] ? __sanitizer_cov_trace_cmp8+0x11/0x20 [ 2693.791614] ? blk_account_io_done+0xe50/0xe50 [ 2693.791630] ? blk_rq_bio_prep+0x26f/0x360 [ 2693.791668] blk_mq_make_request+0x656/0x1790 [ 2693.791688] ? blk_mq_try_issue_directly+0x950/0x950 [ 2693.791718] ? __lock_acquire+0x548/0x3fb0 [ 2693.791735] generic_make_request+0x740/0x12d0 [ 2693.832703] ? blk_queue_enter+0xe90/0xe90 [ 2693.836952] ? find_held_lock+0x35/0x130 [ 2693.841023] ? guard_bio_eod+0x1cc/0x630 [ 2693.845102] submit_bio+0xba/0x480 [ 2693.848651] ? submit_bio+0xba/0x480 [ 2693.852373] ? lock_downgrade+0x880/0x880 [ 2693.856540] ? generic_make_request+0x12d0/0x12d0 [ 2693.861398] ? memset+0x32/0x40 [ 2693.864704] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2693.870381] ? guard_bio_eod+0x293/0x630 [ 2693.874462] mpage_readpages+0x466/0x630 [ 2693.878644] ? do_mpage_readpage+0x20e0/0x20e0 [ 2693.883253] ? check_disk_change+0x140/0x140 [ 2693.887719] ? rcu_read_lock_sched_held+0x110/0x130 [ 2693.892767] ? blkdev_write_begin+0x50/0x50 [ 2693.897113] blkdev_readpages+0x2d/0x40 [ 2693.901102] read_pages+0x10f/0x550 [ 2693.904777] ? read_cache_pages+0x670/0x670 [ 2693.909114] ? __page_cache_alloc+0x131/0x460 [ 2693.913622] __do_page_cache_readahead+0x4c6/0x5c0 [ 2693.918571] ? read_pages+0x550/0x550 [ 2693.922388] ? lock_downgrade+0x880/0x880 [ 2693.926559] force_page_cache_readahead+0x1e9/0x360 [ 2693.931591] page_cache_sync_readahead+0x4b9/0x520 [ 2693.936544] generic_file_read_iter+0x1582/0x2870 [ 2693.941427] ? aa_file_perm+0x3cf/0xdc0 [ 2693.945431] ? filemap_write_and_wait_range+0xd0/0xd0 [ 2693.950631] ? aa_file_perm+0x3f6/0xdc0 [ 2693.954616] ? find_held_lock+0x35/0x130 [ 2693.958689] ? aa_path_link+0x460/0x460 [ 2693.962685] blkdev_read_iter+0x120/0x190 [ 2693.966851] __vfs_read+0x610/0x8c0 [ 2693.970508] ? vfs_copy_file_range+0xbb0/0xbb0 [ 2693.975117] ? rw_verify_area+0x118/0x360 [ 2693.979284] vfs_read+0x194/0x3e0 [ 2693.983277] ksys_read+0xea/0x1f0 [ 2693.986744] ? kernel_write+0x120/0x120 [ 2693.990735] ? do_syscall_64+0x26/0x610 [ 2693.994726] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2694.000099] ? do_syscall_64+0x26/0x610 [ 2694.004105] __x64_sys_read+0x73/0xb0 [ 2694.007947] do_syscall_64+0x103/0x610 [ 2694.011858] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2694.017075] RIP: 0033:0x7fc863f10310 [ 2694.020808] Code: 73 01 c3 48 8b 0d 28 4b 2b 00 31 d2 48 29 c2 64 89 11 48 83 c8 ff eb ea 90 90 83 3d e5 a2 2b 00 00 75 10 b8 00 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 6e 8a 01 00 48 89 04 24 [ 2694.039719] RSP: 002b:00007ffe47a5f808 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2694.047439] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fc863f10310 [ 2694.054711] RDX: 0000000000000400 RSI: 000000000226ac58 RDI: 0000000000000003 [ 2694.061991] RBP: 000000000226ac30 R08: 0000000000000028 R09: 0000000001680000 [ 2694.069287] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000226a030 [ 2694.076577] R13: 0000000000000400 R14: 000000000226a080 R15: 000000000226ac48 [ 2694.083859] [ 2694.085506] Allocated by task 3543: [ 2694.089144] save_stack+0x45/0xd0 [ 2694.092612] __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2694.097548] kasan_kmalloc+0x9/0x10 [ 2694.101184] kmem_cache_alloc_trace+0x151/0x760 [ 2694.105859] add_partition+0x1a6/0xe30 [ 2694.109764] rescan_partitions+0x668/0xa20 [ 2694.114015] __blkdev_reread_part+0x1a2/0x230 [ 2694.118528] blkdev_reread_part+0x27/0x40 [ 2694.122776] loop_reread_partitions+0x1c/0x40 [ 2694.127295] loop_set_status+0xe57/0x1380 [ 2694.131464] loop_set_status64+0xc2/0x120 [ 2694.135623] lo_ioctl+0x43b/0x20d0 [ 2694.139176] blkdev_ioctl+0xee8/0x1c40 [ 2694.143100] block_ioctl+0xee/0x130 [ 2694.146744] do_vfs_ioctl+0xd6e/0x1390 [ 2694.150638] ksys_ioctl+0xab/0xd0 [ 2694.154102] __x64_sys_ioctl+0x73/0xb0 [ 2694.158000] do_syscall_64+0x103/0x610 [ 2694.161915] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2694.167108] [ 2694.168744] Freed by task 15370: [ 2694.172120] save_stack+0x45/0xd0 [ 2694.175581] __kasan_slab_free+0x102/0x150 [ 2694.179852] kasan_slab_free+0xe/0x10 [ 2694.183667] kfree+0xcf/0x230 [ 2694.186784] part_release+0xaa/0xd0 [ 2694.190422] device_release+0x7d/0x210 [ 2694.194377] kobject_put.cold+0x28f/0x2ec [ 2694.198532] put_device+0x20/0x30 [ 2694.202005] delete_partition_work_fn+0x14a/0x1b0 [ 2694.206877] process_one_work+0x98e/0x1790 [ 2694.211136] worker_thread+0x98/0xe40 [ 2694.214946] kthread+0x357/0x430 [ 2694.218335] ret_from_fork+0x3a/0x50 [ 2694.222042] [ 2694.223692] The buggy address belongs to the object at ffff8880954f3640 [ 2694.223692] which belongs to the cache kmalloc-2k of size 2048 [ 2694.236349] The buggy address is located 0 bytes inside of [ 2694.236349] 2048-byte region [ffff8880954f3640, ffff8880954f3e40) [ 2694.248134] The buggy address belongs to the page: [ 2694.253072] page:ffffea0002553c80 count:1 mapcount:0 mapping:ffff88812c3f0c40 index:0x0 compound_mapcount: 0 [ 2694.263046] flags: 0x1fffc0000010200(slab|head) [ 2694.267725] raw: 01fffc0000010200 ffffea00017ddc88 ffffea0002a32c88 ffff88812c3f0c40 [ 2694.275638] raw: 0000000000000000 ffff8880954f2540 0000000100000003 0000000000000000 [ 2694.283533] page dumped because: kasan: bad access detected [ 2694.289332] [ 2694.290964] Memory state around the buggy address: [ 2694.295934] ffff8880954f3500: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2694.303314] ffff8880954f3580: fb fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc [ 2694.310690] >ffff8880954f3600: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 2694.318057] ^ [ 2694.323517] ffff8880954f3680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2694.330895] ffff8880954f3700: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 2694.338261] ================================================================== [ 2694.345621] Disabling lock debugging due to kernel taint [ 2694.351332] Kernel panic - not syncing: panic_on_warn set ... [ 2694.357238] CPU: 0 PID: 4125 Comm: blkid Tainted: G B 5.0.0+ #11 [ 2694.364682] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2694.366236] kobject: 'loop5' (00000000e512ff8d): kobject_uevent_env [ 2694.374037] Call Trace: [ 2694.374059] dump_stack+0x172/0x1f0 [ 2694.374134] panic+0x2cb/0x65c [ 2694.374152] ? __warn_printk+0xf3/0xf3 [ 2694.393839] ? retint_kernel+0x2d/0x2d [ 2694.395245] kobject: 'loop5' (00000000e512ff8d): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2694.397737] ? trace_hardirqs_on+0x5e/0x230 [ 2694.397756] ? disk_map_sector_rcu+0x475/0x490 [ 2694.397772] end_report+0x47/0x4f [ 2694.397787] ? disk_map_sector_rcu+0x475/0x490 [ 2694.397804] kasan_report.cold+0xe/0x40 [ 2694.428093] ? disk_map_sector_rcu+0x475/0x490 [ 2694.432683] __asan_report_load8_noabort+0x14/0x20 [ 2694.437613] disk_map_sector_rcu+0x475/0x490 [ 2694.442049] ? kasan_check_read+0x11/0x20 [ 2694.446202] blk_account_io_start+0x507/0xcf0 [ 2694.450699] ? __sanitizer_cov_trace_cmp8+0x11/0x20 [ 2694.455715] ? blk_account_io_done+0xe50/0xe50 [ 2694.460300] ? blk_rq_bio_prep+0x26f/0x360 [ 2694.464539] blk_mq_make_request+0x656/0x1790 [ 2694.469039] ? blk_mq_try_issue_directly+0x950/0x950 [ 2694.474149] ? __lock_acquire+0x548/0x3fb0 [ 2694.478387] generic_make_request+0x740/0x12d0 [ 2694.482980] ? blk_queue_enter+0xe90/0xe90 [ 2694.487216] ? find_held_lock+0x35/0x130 [ 2694.491296] ? guard_bio_eod+0x1cc/0x630 [ 2694.495361] submit_bio+0xba/0x480 [ 2694.498914] ? submit_bio+0xba/0x480 [ 2694.502642] ? lock_downgrade+0x880/0x880 [ 2694.506794] ? generic_make_request+0x12d0/0x12d0 [ 2694.511640] ? memset+0x32/0x40 [ 2694.514929] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2694.520463] ? guard_bio_eod+0x293/0x630 [ 2694.524524] mpage_readpages+0x466/0x630 [ 2694.528591] ? do_mpage_readpage+0x20e0/0x20e0 [ 2694.533186] ? check_disk_change+0x140/0x140 [ 2694.537598] ? rcu_read_lock_sched_held+0x110/0x130 [ 2694.542613] ? blkdev_write_begin+0x50/0x50 [ 2694.546937] blkdev_readpages+0x2d/0x40 [ 2694.550924] read_pages+0x10f/0x550 [ 2694.554574] ? read_cache_pages+0x670/0x670 [ 2694.558936] ? __page_cache_alloc+0x131/0x460 [ 2694.563439] __do_page_cache_readahead+0x4c6/0x5c0 [ 2694.568372] ? read_pages+0x550/0x550 [ 2694.572175] ? lock_downgrade+0x880/0x880 [ 2694.576327] force_page_cache_readahead+0x1e9/0x360 [ 2694.581350] page_cache_sync_readahead+0x4b9/0x520 [ 2694.586319] generic_file_read_iter+0x1582/0x2870 [ 2694.591176] ? aa_file_perm+0x3cf/0xdc0 [ 2694.595165] ? filemap_write_and_wait_range+0xd0/0xd0 [ 2694.600355] ? aa_file_perm+0x3f6/0xdc0 [ 2694.604348] ? find_held_lock+0x35/0x130 [ 2694.608420] ? aa_path_link+0x460/0x460 [ 2694.612396] blkdev_read_iter+0x120/0x190 [ 2694.616544] __vfs_read+0x610/0x8c0 [ 2694.620190] ? vfs_copy_file_range+0xbb0/0xbb0 [ 2694.624800] ? rw_verify_area+0x118/0x360 [ 2694.628950] vfs_read+0x194/0x3e0 [ 2694.632404] ksys_read+0xea/0x1f0 [ 2694.635862] ? kernel_write+0x120/0x120 [ 2694.639855] ? do_syscall_64+0x26/0x610 [ 2694.643840] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2694.649209] ? do_syscall_64+0x26/0x610 [ 2694.653187] __x64_sys_read+0x73/0xb0 [ 2694.656992] do_syscall_64+0x103/0x610 [ 2694.660906] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2694.666095] RIP: 0033:0x7fc863f10310 [ 2694.669809] Code: 73 01 c3 48 8b 0d 28 4b 2b 00 31 d2 48 29 c2 64 89 11 48 83 c8 ff eb ea 90 90 83 3d e5 a2 2b 00 00 75 10 b8 00 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 6e 8a 01 00 48 89 04 24 [ 2694.688711] RSP: 002b:00007ffe47a5f808 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2694.696597] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fc863f10310 [ 2694.703865] RDX: 0000000000000400 RSI: 000000000226ac58 RDI: 0000000000000003 [ 2694.711176] RBP: 000000000226ac30 R08: 0000000000000028 R09: 0000000001680000 [ 2694.718440] R10: 0000000000000000 R11: 0000000000000246 R12: 000000000226a030 [ 2694.725726] R13: 0000000000000400 R14: 000000000226a080 R15: 000000000226ac48 [ 2694.733820] Kernel Offset: disabled [ 2694.737441] Rebooting in 86400 seconds..