, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e", 0x37, 0x2, 0x0, 0x5}, &(0x7f0000000300)) 06:42:24 executing program 2: socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x5}, &(0x7f0000000300)) [ 821.313117][ T4344] Dev loop5: unable to read RDB block 9 [ 821.332303][ T4344] loop5: AHDI p1 p2 p4 06:42:24 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}}}, 0x78) [ 821.358848][ T4344] loop5: partition table partially beyond EOD, truncated 06:42:24 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xe3aa5b0dbf4a42da, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39298b181ee6b9ddc4ac339deb1c445184fa8a83f5248e5cba5cc63fffa39f613906dc3de7198344042386f8fa7bcc2aa0c50dd42e11e8a75dacf96442cfc354d3ca7421bfbb3718d359d48fd5dca1f25314548f19145eb4c9b1aeee545fe253038fe8542fa643e737bef86dc664f031c0f95215fee95b8a9074a383c4f750f82e90cb2d0dd272b6a4f204ce3ee9f48af63a1b5bafaed8eef06528b64d304db2a0bda15e7fb6164e4e7fa27c37d4e16bc2", 0xec, 0x2, 0x0, 0x5}, &(0x7f0000000300)) [ 821.446908][ T4344] loop5: p1 start 1362130174 is beyond EOD, truncated 06:42:24 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e", 0x37, 0x2, 0x0, 0x5}, &(0x7f0000000300)) [ 821.492693][ T4344] loop5: p2 start 1256873442 is beyond EOD, truncated 06:42:24 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000}}}, 0x78) 06:42:24 executing program 2: socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0}, &(0x7f0000000300)) [ 821.616080][ T4344] Dev loop5: unable to read RDB block 9 06:42:24 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000}}}, 0x78) [ 821.675868][ T4344] loop5: AHDI p1 p2 p4 [ 821.726902][ T4344] loop5: partition table partially beyond EOD, truncated [ 821.735488][ T4344] loop5: p1 start 1362130174 is beyond EOD, truncated [ 821.753297][ T4344] loop5: p2 start 1256873442 is beyond EOD, truncated [ 821.821461][ T4357] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value 06:42:24 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:42:24 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xe3aa5b0dbf4a42da, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39298b181ee6b9ddc4ac339deb1c445184fa8a83f5248e5cba5cc63fffa39f613906dc3de7198344042386f8fa7bcc2aa0c50dd42e11e8a75dacf96442cfc354d3ca7421bfbb3718d359d48fd5dca1f25314548f19145eb4c9b1aeee545fe253038fe8542fa643e737bef86dc664f031c0f95215fee95b8a9074a383c4f750f82e90cb2d0dd272b6a4f204ce3ee9f48af63a1b5bafaed8eef06528b64d304db2a0bda15e7fb6164e4e7fa27c37d4e16bc2", 0xec, 0x2, 0x0, 0x5}, &(0x7f0000000300)) 06:42:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=ima#ig'}, {@hash='hash'}]}) 06:42:24 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e", 0x37, 0x2, 0x0, 0x5}, &(0x7f0000000300)) 06:42:24 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000}}}, 0x78) 06:42:24 executing program 2: socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0}, &(0x7f0000000300)) 06:42:24 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xe3aa5b0dbf4a42da, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39298b181ee6b9ddc4ac339deb1c445184fa8a83f5248e5cba5cc63fffa39f613906dc3de7198344042386f8fa7bcc2aa0c50dd42e11e8a75dacf96442cfc354d3ca7421bfbb3718d359d48fd5dca1f25314548f19145eb4c9b1aeee545fe253038fe8542fa643e737bef86dc664f031c0f95215fee95b8a9074a383c4f750f82e90cb2d0dd272b6a4f204ce3ee9f48af63a1b5bafaed8eef06528b64d304db2a0bda15e7fb6164e4e7fa27c37d4e16bc2", 0xec, 0x2, 0x0, 0x5}, &(0x7f0000000300)) 06:42:24 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d", 0x3b, 0x2, 0x0, 0x5}, &(0x7f0000000300)) [ 822.116773][ T4394] Dev loop5: unable to read RDB block 9 [ 822.135451][ T4394] loop5: AHDI p1 p2 p4 [ 822.154000][ T4394] loop5: partition table partially beyond EOD, truncated 06:42:25 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000}}}, 0x78) [ 822.174056][ T4394] loop5: p1 start 1362130174 is beyond EOD, truncated [ 822.190271][ T4394] loop5: p2 start 1256873442 is beyond EOD, truncated 06:42:25 executing program 2: socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0}, &(0x7f0000000300)) 06:42:25 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}}}, 0x78) 06:42:25 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xe3aa5b0dbf4a42da, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39298b181ee6b9ddc4ac339deb1c445184fa8a83f5248e5cba5cc63fffa39f613906dc3de7198344042386f8fa7bcc2aa0c50dd42e11e8a75dacf96442cfc354d3ca7421bfbb3718d359d48fd5dca1f25314548f19145eb4c9b1aeee545fe253038fe8542fa643e737bef86dc664f031c0f95215fee95b8a9074a383c4f750f82e90cb2d0dd272b6a4f204ce3ee9f48af63a1b5bafaed8eef06528b64d304db2a0bda15e7fb6164e4e7fa27c37d4e16bc2", 0xec, 0x2, 0x0, 0x5}, &(0x7f0000000300)) 06:42:25 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d", 0x3b, 0x2, 0x0, 0x5}, &(0x7f0000000300)) 06:42:25 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) [ 822.510162][ T4413] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value [ 822.653458][ T4432] Dev loop5: unable to read RDB block 9 [ 822.663179][ T4432] loop5: AHDI p1 p2 p4 [ 822.667589][ T4432] loop5: partition table partially beyond EOD, truncated [ 822.692530][ T4432] loop5: p1 start 1362130174 is beyond EOD, truncated [ 822.699355][ T4432] loop5: p2 start 1256873442 is beyond EOD, truncated 06:42:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=ima%ig'}, {@hash='hash'}]}) 06:42:25 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x57000000}}}, 0x78) 06:42:25 executing program 2: socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0}, 0x0) 06:42:25 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d", 0x3b, 0x2, 0x0, 0x5}, &(0x7f0000000300)) 06:42:25 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xe3aa5b0dbf4a42da, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39298b181ee6b9ddc4ac339deb1c445184fa8a83f5248e5cba5cc63fffa39f613906dc3de7198344042386f8fa7bcc2aa0c50dd42e11e8a75dacf96442cfc354d3ca7421bfbb3718d359d48fd5dca1f25314548f19145eb4c9b1aeee545fe253038fe8542fa643e737bef86dc664f031c0f95215fee95b8a9074a383c4f750f82e90cb2d0dd272b6a4f204ce3ee9f48af63a1b5bafaed8eef06528b64d304db2a0bda15e7fb6164e4e7fa27c37d4e16bc2", 0xec, 0x2, 0x0, 0x5}, &(0x7f0000000300)) 06:42:25 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdaffffff}}}, 0x78) [ 822.882863][ T4432] Dev loop5: unable to read RDB block 9 [ 822.888505][ T4432] loop5: AHDI p1 p2 p4 [ 822.941288][ T4432] loop5: partition table partially beyond EOD, truncated [ 822.969652][ T4432] loop5: p1 start 1362130174 is beyond EOD, truncated 06:42:25 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffda}}}, 0x78) [ 822.999158][ T4432] loop5: p2 start 1256873442 is beyond EOD, truncated 06:42:25 executing program 2: socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0}, 0x0) 06:42:25 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d3929", 0x3d, 0x2, 0x0, 0x5}, &(0x7f0000000300)) 06:42:25 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78}, 0x78) 06:42:25 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:42:25 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}}, 0x78) [ 823.348356][ T4467] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value [ 823.419808][ T4493] Dev loop5: unable to read RDB block 9 [ 823.442883][ T4493] loop5: AHDI p1 p2 p4 [ 823.447242][ T4493] loop5: partition table partially beyond EOD, truncated [ 823.455553][ T4493] loop5: p1 start 1362130174 is beyond EOD, truncated [ 823.462906][ T4493] loop5: p2 start 1256873442 is beyond EOD, truncated 06:42:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=ima*ig'}, {@hash='hash'}]}) 06:42:26 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xe3aa5b0dbf4a42da, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39298b181ee6b9ddc4ac339deb1c445184fa8a83f5248e5cba5cc63fffa39f613906dc3de7198344042386f8fa7bcc2aa0c50dd42e11e8a75dacf96442cfc354d3ca7421bfbb3718d359d48fd5dca1f25314548f19145eb4c9b1aeee545fe253038fe8542fa643e737bef86dc664f031c0f95215fee95b8a9074a383c4f750f82e90cb2d0dd272b6a4f204ce3ee9f48af63a1b5bafaed8eef06528b64d304db2a0bda15e7fb6164e4e7fa27c37d4e16bc2", 0xec, 0x2, 0x0, 0x5}, &(0x7f0000000300)) 06:42:26 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}}, 0x78) 06:42:26 executing program 2: socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0}, 0x0) 06:42:26 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2, 0x0, 0x5}, &(0x7f0000000300)) 06:42:26 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}}, 0x78) [ 823.652797][ T4493] Dev loop5: unable to read RDB block 9 [ 823.676649][ T4493] loop5: AHDI p1 p2 p4 [ 823.693704][ T4493] loop5: partition table partially beyond EOD, truncated 06:42:26 executing program 1: io_setup(0x7ff, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xe3aa5b0dbf4a42da, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39298b181ee6b9ddc4ac339deb1c445184fa8a83f5248e5cba5cc63fffa39f613906dc3de7198344042386f8fa7bcc2aa0c50dd42e11e8a75dacf96442cfc354d3ca7421bfbb3718d359d48fd5dca1f25314548f19145eb4c9b1aeee545fe253038fe8542fa643e737bef86dc664f031c0f95215fee95b8a9074a383c4f750f82e90cb2d0dd272b6a4f204ce3ee9f48af63a1b5bafaed8eef06528b64d304db2a0bda15e7fb6164e4e7fa27c37d4e16bc2", 0xec, 0x2, 0x0, 0x5}, &(0x7f0000000300)) 06:42:26 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d", 0x3b, 0x2, 0x0, 0x5}, &(0x7f0000000300)) [ 823.741865][ T4493] loop5: p1 start 1362130174 is beyond EOD, truncated [ 823.792458][ T4493] loop5: p2 start 1256873442 is beyond EOD, truncated 06:42:26 executing program 2: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0), 0x0, 0x2, 0x0, 0x5}, &(0x7f0000000300)) [ 823.850594][ T4512] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value 06:42:26 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:42:26 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}}}, 0x78) 06:42:26 executing program 1: io_setup(0x7ff, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xe3aa5b0dbf4a42da, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39298b181ee6b9ddc4ac339deb1c445184fa8a83f5248e5cba5cc63fffa39f613906dc3de7198344042386f8fa7bcc2aa0c50dd42e11e8a75dacf96442cfc354d3ca7421bfbb3718d359d48fd5dca1f25314548f19145eb4c9b1aeee545fe253038fe8542fa643e737bef86dc664f031c0f95215fee95b8a9074a383c4f750f82e90cb2d0dd272b6a4f204ce3ee9f48af63a1b5bafaed8eef06528b64d304db2a0bda15e7fb6164e4e7fa27c37d4e16bc2", 0xec, 0x2, 0x0, 0x5}, &(0x7f0000000300)) 06:42:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=ima+ig'}, {@hash='hash'}]}) 06:42:26 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d", 0x3b, 0x2, 0x0, 0x5}, &(0x7f0000000300)) 06:42:26 executing program 2: socket$inet6_sctp(0xa, 0x0, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0) io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xe3aa5b0dbf4a42da, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39298b181ee6b9ddc4ac339deb1c445184fa8a83f5248e5cba5cc63fffa39f613906dc3de7198344042386f8fa7bcc2aa0c50dd42e11e8a75dacf96442cfc354d3ca7421bfbb3718d359d48fd5dca1f25314548f19145eb4c9b1aeee545fe253038fe8542fa643e737bef86dc664f031c0f95215fee95b8a9074a383c4f750f82e90cb2d0dd272b6a4f204ce3ee9f48af63a1b5bafaed8eef06528b64d304db2a0bda15e7fb6164e4e7fa27c37d4e16bc2", 0xec, 0x2, 0x0, 0x5}, &(0x7f0000000300)) 06:42:27 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd}}}, 0x78) [ 824.214051][ T4537] Dev loop5: unable to read RDB block 9 [ 824.258933][ T4537] loop5: AHDI p1 p2 p4 06:42:27 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24}}}, 0x78) 06:42:27 executing program 1: io_setup(0x7ff, &(0x7f0000000180)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xe3aa5b0dbf4a42da, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39298b181ee6b9ddc4ac339deb1c445184fa8a83f5248e5cba5cc63fffa39f613906dc3de7198344042386f8fa7bcc2aa0c50dd42e11e8a75dacf96442cfc354d3ca7421bfbb3718d359d48fd5dca1f25314548f19145eb4c9b1aeee545fe253038fe8542fa643e737bef86dc664f031c0f95215fee95b8a9074a383c4f750f82e90cb2d0dd272b6a4f204ce3ee9f48af63a1b5bafaed8eef06528b64d304db2a0bda15e7fb6164e4e7fa27c37d4e16bc2", 0xec, 0x2, 0x0, 0x5}, &(0x7f0000000300)) [ 824.309610][ T4537] loop5: partition table partially beyond EOD, truncated [ 824.342534][ T4537] loop5: p1 start 1362130174 is beyond EOD, truncated [ 824.354731][ T4537] loop5: p2 start 1256873442 is beyond EOD, truncated 06:42:27 executing program 2: perf_event_open(&(0x7f0000000600)={0x1, 0x43b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x29, 0x1000000000002, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000)=0x200ca, 0x4) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000040)=0x6e58, 0x4) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r2, 0x401c5820, &(0x7f0000000180)=0x18) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x8, &(0x7f0000000080), 0x8) 06:42:27 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d", 0x3b, 0x2, 0x0, 0x5}, &(0x7f0000000300)) [ 824.514198][ T4537] Dev loop5: unable to read RDB block 9 [ 824.551258][ T4537] loop5: AHDI p1 p2 p4 [ 824.567741][ T4553] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value [ 824.578732][ T4537] loop5: partition table partially beyond EOD, truncated 06:42:27 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x57}}}, 0x78) [ 824.633175][ T4537] loop5: p1 start 1362130174 is beyond EOD, truncated [ 824.640041][ T4537] loop5: p2 start 1256873442 is beyond EOD, truncated 06:42:27 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:42:27 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, 0x0, &(0x7f0000000300)) 06:42:27 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x0, 0x0, 0x5}, &(0x7f0000000300)) 06:42:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=ima-ig'}, {@hash='hash'}]}) 06:42:27 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900}}}, 0x78) 06:42:27 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x0, 0x0, 0x5}, &(0x7f0000000300)) 06:42:27 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, 0x0, &(0x7f0000000300)) [ 825.046272][ T4586] Dev loop5: unable to read RDB block 9 [ 825.052020][ T4586] loop5: AHDI p1 p2 p4 [ 825.077583][ T4586] loop5: partition table partially beyond EOD, truncated [ 825.203032][ T4586] loop5: p1 start 1362130174 is beyond EOD, truncated [ 825.209868][ T4586] loop5: p2 start 1256873442 is beyond EOD, truncated 06:42:28 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x0, 0x0, 0x5}, &(0x7f0000000300)) 06:42:28 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00}}}, 0x78) [ 825.387225][ T4591] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value [ 825.400793][ T4586] Dev loop5: unable to read RDB block 9 [ 825.407925][ T4586] loop5: AHDI p1 p2 p4 [ 825.413100][ T4586] loop5: partition table partially beyond EOD, truncated [ 825.421075][ T4586] loop5: p1 start 1362130174 is beyond EOD, truncated [ 825.428344][ T4586] loop5: p2 start 1256873442 is beyond EOD, truncated 06:42:28 executing program 2: r0 = creat(&(0x7f00000003c0)='./bus\x00', 0x0) fcntl$setstatus(r0, 0x4, 0x44000) r1 = open(&(0x7f0000000600)='./bus\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f0000000080)={0x14}, 0xffffffab) io_setup(0x40000100000001, &(0x7f00000001c0)=0x0) io_submit(r2, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x804000000000000, 0x0, 0x8, 0x1, 0x0, r0, 0x0}]) 06:42:28 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) 06:42:28 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2400}}}, 0x78) 06:42:28 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, 0x0, &(0x7f0000000300)) 06:42:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=ima.ig'}, {@hash='hash'}]}) 06:42:28 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:42:28 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00}}}, 0x78) [ 825.924951][ T4626] Dev loop5: unable to read RDB block 9 [ 825.954397][ T4626] loop5: AHDI p1 p2 p4 06:42:28 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39298b181ee6b9ddc4ac339deb1c445184fa8a83f5248e5cba5cc63fffa39f613906dc3de7198344042386f8fa7bcc2aa0c50dd42e11e8a75dacf96442cfc354d3ca7421bfbb3718d359d48fd5dca1f25314548f19145eb4c9b1aeee545fe253038fe8542fa643e737bef86dc664f031c0f95215fee95b8a9074a383c4f750f82e90cb2d0dd272b6a4f204ce3ee9f48af63a1b5bafaed8eef06528b64d304db2a0bda15e7fb6164e4e7fa27c37d4e16bc2", 0xec, 0x2, 0x0, 0x5}, &(0x7f0000000300)) 06:42:28 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) [ 825.990259][ T4626] loop5: partition table partially beyond EOD, truncated [ 826.093032][ T4626] loop5: p1 start 1362130174 is beyond EOD, truncated [ 826.154774][ T4626] loop5: p2 start 1256873442 is beyond EOD, truncated 06:42:29 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 06:42:29 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, 0x0) [ 826.230123][ T4628] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value 06:42:29 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39298b181ee6b9ddc4ac339deb1c445184fa8a83f5248e5cba5cc63fffa39f613906dc3de7198344042386f8fa7bcc2aa0c50dd42e11e8a75dacf96442cfc354d3ca7421bfbb3718d359d48fd5dca1f25314548f19145eb4c9b1aeee545fe253038fe8542fa643e737bef86dc664f031c0f95215fee95b8a9074a383c4f750f82e90cb2d0dd272b6a4f204ce3ee9f48af63a1b5bafaed8eef06528b64d304db2a0bda15e7fb6164e4e7fa27c37d4e16bc2", 0xec, 0x2, 0x0, 0x5}, &(0x7f0000000300)) [ 826.366124][ T4626] Dev loop5: unable to read RDB block 9 [ 826.371785][ T4626] loop5: AHDI p1 p2 p4 [ 826.389292][ T4626] loop5: partition table partially beyond EOD, truncated [ 826.523695][ T4626] loop5: p1 start 1362130174 is beyond EOD, truncated [ 826.530526][ T4626] loop5: p2 start 1256873442 is beyond EOD, truncated 06:42:29 executing program 2: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@fwd={0x0, 0x0, 0x0, 0x2}, @func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, 0x0, 0x32}, 0x20) 06:42:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=ima0ig'}, {@hash='hash'}]}) 06:42:29 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5700}}}, 0x78) 06:42:29 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="ae02e0285451423020bf4bb1f233a32d034ce718517fcc6feba8e13da3f25b822c0caedef77480025ed03931ee0b25e1587076dc14f2a83a792218e2b0b46859f6298e099db7873db886a5c2ec0af2826d2a73e5d79e78a2715eec7f36ebcb312e87f7daeb6e6ecce7f88fbeb7f8890e11d6b35f2e49df09ca6eebc2f0835a280ad84abbc9b3ed31e1438048ff5afe722d3ed3a1af7a6c3e7f07f4a4de58443e264fc6d7335bd326c747772daea7f42d3931f7c59a4749d5e442256b10b60b27f3275ff8c981b2a4af2c283fb1f40cde0ba30ee1fc087f1171c45758df7897fa1b2ac8495490210035d99bf4909d8c905b0260dbac903596c5c7839b193cf57c796bd3b69490f7bd0adfebdb296ecfa3cc994d1e7b76d5b694b00bb8d679376928697520adbcef9b513fcc92f216420ea95f9fc5e71fd22a982563cf9b4cec57ac66cc420d94c88569f5a715292bd8450735cff08fd4f684400190df78a309c02f3fefe507231903f56f4f2fccbd37fb5d54441029b822f4ceccc68adadfdd458ec5c89d2982343c0cd23039db490f92a3541b049763d04c66c08bca633fb681f0a757506766488271f7d3d8375ce360c3bc1ff3820b62875ad7521b34dce16e3ec439ad7219f0513074fe296b1cfa7fd5d05f4aea5de26fa70bd4e6c0934c0a11af974a066df40f61434a", 0x1eb, 0x3}]) 06:42:29 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, 0x0) 06:42:29 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39298b181ee6b9ddc4ac339deb1c445184fa8a83f5248e5cba5cc63fffa39f613906dc3de7198344042386f8fa7bcc2aa0c50dd42e11e8a75dacf96442cfc354d3ca7421bfbb3718d359d48fd5dca1f25314548f19145eb4c9b1aeee545fe253038fe8542fa643e737bef86dc664f031c0f95215fee95b8a9074a383c4f750f82e90cb2d0dd272b6a4f204ce3ee9f48af63a1b5bafaed8eef06528b64d304db2a0bda15e7fb6164e4e7fa27c37d4e16bc2", 0xec, 0x2, 0x0, 0x5}, &(0x7f0000000300)) [ 827.123933][ T4684] Dev loop5: unable to read RDB block 9 [ 827.133652][ T4684] loop5: AHDI p1 p2 p4 [ 827.170354][ T4684] loop5: partition table partially beyond EOD, truncated 06:42:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(0x0, &(0x7f00000005c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={0x0}) 06:42:30 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}}}, 0x78) 06:42:30 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39298b181ee6b9ddc4ac339deb1c445184fa8a83f5248e5cba5cc63fffa39f613906dc3de7198344042386f8fa7bcc2aa0c50dd42e11e8a75dacf96442cfc354d3ca7421bfbb3718d359d48fd5dca1f25314548f19145eb4c9b1aeee545fe253038fe8542fa643e737bef86dc664f031c0f95215fee95b8a9074a383c4f750f82e90cb2d0dd272b6a4f204ce3ee9f48af63a1b5bafaed8eef06528b64d304db2a0bda15e7fb6164e4e7fa27c37d4e16bc2", 0xec, 0x2, 0x0, 0x5}, &(0x7f0000000300)) 06:42:30 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, 0x0) [ 827.211320][ T4684] loop5: p1 start 1362130174 is beyond EOD, truncated [ 827.228537][ T4684] loop5: p2 start 1256873442 is beyond EOD, truncated [ 827.291476][ T4676] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value 06:42:30 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}}}, 0x78) 06:42:30 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:42:30 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39298b181ee6b9ddc4ac339deb1c445184fa8a83f5248e5cba5cc63fffa39f613906dc3de7198344042386f8fa7bcc2aa0c50dd42e11e8a75dacf96442cfc354d3ca7421bfbb3718d359d48fd5dca1f25314548f19145eb4c9b1aeee545fe253038fe8542fa643e737bef86dc664f031c0f95215fee95b8a9074a383c4f750f82e90cb2d0dd272b6a4f204ce3ee9f48af63a1b5bafaed8eef06528b64d304db2a0bda15e7fb6164e4e7fa27c37d4e16bc2", 0xec, 0x2, 0x0, 0x5}, &(0x7f0000000300)) 06:42:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imaXig'}, {@hash='hash'}]}) 06:42:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(0x0, &(0x7f00000005c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={0x0}) 06:42:30 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) shutdown(0xffffffffffffffff, 0x0) setsockopt$sock_timeval(r0, 0xffff, 0x4, &(0x7f0000001080), 0x10) recvfrom$inet(r0, 0x0, 0xd85bc68d, 0x2, 0x0, 0x800e005ad) shutdown(r0, 0x0) 06:42:30 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}}}, 0x78) [ 827.755907][ T4720] Dev loop5: unable to read RDB block 9 [ 827.761772][ T4720] loop5: AHDI p1 p2 p4 [ 827.768640][ T4720] loop5: partition table partially beyond EOD, truncated [ 827.779750][ T4720] loop5: p1 start 1362130174 is beyond EOD, truncated [ 827.790275][ T4720] loop5: p2 start 1256873442 is beyond EOD, truncated 06:42:30 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}}}, 0x78) 06:42:30 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0, 0x5}, &(0x7f0000000300)) 06:42:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(0x0, &(0x7f00000005c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) 06:42:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(0x0, &(0x7f00000005c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={0x0}) 06:42:30 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000}}}, 0x78) 06:42:30 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x5}, &(0x7f0000000300)) [ 828.006888][ T4720] Dev loop5: unable to read RDB block 9 [ 828.025043][ T4720] loop5: AHDI p1 p2 p4 [ 828.139934][ T4720] loop5: partition table partially beyond EOD, truncated [ 828.192324][ T4720] loop5: p1 start 1362130174 is beyond EOD, truncated [ 828.199143][ T4720] loop5: p2 start 1256873442 is beyond EOD, truncated 06:42:31 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:42:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(0x0, &(0x7f00000005c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) [ 828.325442][ T4726] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value 06:42:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=ima\\ig'}, {@hash='hash'}]}) 06:42:31 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000}}}, 0x78) 06:42:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(0x0, &(0x7f00000005c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={0x0}) 06:42:31 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, &(0x7f0000000300)) 06:42:31 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'hash\x00', 0x0, 0x0, 'ghash\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="0a0775b0d5e383e5b3c06639d476a0bf", 0x10) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) r2 = accept4(r1, 0x0, 0x0, 0x0) sendmsg$inet(r2, &(0x7f0000001c80)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="c7", 0x1}], 0x1}, 0x4c081) sendmsg$TIPC_NL_BEARER_ADD(r2, &(0x7f0000001500)={0x0, 0x0, &(0x7f00000014c0)={&(0x7f00000013c0)={0x14}, 0x7ffff000}}, 0x0) 06:42:31 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000}}}, 0x78) 06:42:31 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) [ 828.612335][ T4768] Dev loop5: unable to read RDB block 9 [ 828.618905][ T4768] loop5: AHDI p1 p2 p4 [ 828.648965][ T4768] loop5: partition table partially beyond EOD, truncated 06:42:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(0x0, &(0x7f00000005c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) [ 828.768325][ T4768] loop5: p1 start 1362130174 is beyond EOD, truncated 06:42:31 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000}}}, 0x78) [ 828.821295][ T4768] loop5: p2 start 1256873442 is beyond EOD, truncated 06:42:31 executing program 1: r0 = socket$inet(0x2, 0x80001, 0x84) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x23, &(0x7f00000000c0), 0x8) [ 828.965039][ T4768] Dev loop5: unable to read RDB block 9 [ 828.980325][ T4768] loop5: AHDI p1 p2 p4 [ 829.024796][ T4777] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value [ 829.029790][ T4768] loop5: partition table partially beyond EOD, truncated [ 829.072806][ T4768] loop5: p1 start 1362130174 is beyond EOD, truncated [ 829.112279][ T4768] loop5: p2 start 1256873442 is beyond EOD, truncated 06:42:32 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:42:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(0x0, &(0x7f00000005c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) 06:42:32 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="b4000000000000298f0ec0ff0000000095cf810000000000"], &(0x7f0000000180)='EP\xd4\x00\x1f\x91\xeb/W\xb72$C0%\x03\x9c0\x96\xb2\fkC\x93H\xbfh\x9c\b`\x857\xd6\">c\xad\xc0bO\xba\xe2\xe1\t5\x9d\xcei\"2L\xcc\x13\x16\vh\xca\xe6C\x06\x97%\x9d\xd5-\x1fs\xe1j\xdc5\x92\xd0)%\xdf\xfa\xe8^\x9c\xd29\x8clg\xc8\x7f\xb5\xb1&\x02\xf1E\xb4\x84\xbeE\x91)f\xe8\xb7\xe2\xf6`i\xc5m\xd7l\x1d\xc1\x12\x01<:kM\xe9\x99\xcd\xcd\xc8\x85Z\xee47\xdc\xc8u\x80\xcf\xbeTo\xbb\xfb\xc0\xebV\xd8\xbb\xbe\xa2\x90J|s\xc2', 0x2, 0xfd13, &(0x7f0000000240)=""/195}, 0x26) 06:42:32 executing program 0: perf_event_open(&(0x7f0000000a00)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/fib_trie\x00') preadv(r0, &(0x7f0000000480), 0x100000000000022c, 0x6c00000000000000) 06:42:32 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}}}, 0x78) 06:42:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imacig'}, {@hash='hash'}]}) 06:42:32 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x400000003, 0x10) sendmsg$kcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002b008163e45ae08700000301100f00000000e0fc4cc91b4dd65b2f0580cb7023072a556d1c958c000000", 0x2e}], 0x1}, 0x0) 06:42:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(0x0, &(0x7f00000005c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) 06:42:32 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x57000000}}}, 0x78) 06:42:32 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000000)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee3, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0}) [ 829.548099][ T4820] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value [ 829.569341][ T4824] Dev loop5: unable to read RDB block 9 06:42:32 executing program 1: r0 = socket$kcm(0x2b, 0x8000000000001, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0x10, 0x400000003, 0x10) sendmsg$kcm(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e0000002b008163e45ae08700000301100f00000000e0fc4cc91b4dd65b2f0580cb7023072a556d1c958c000000", 0x2e}], 0x1}, 0x0) 06:42:32 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdaffffff}}}, 0x78) [ 829.598397][ T4824] loop5: AHDI p1 p2 p4 [ 829.613697][ T4824] loop5: partition table partially beyond EOD, truncated [ 829.633201][ T4824] loop5: p1 start 1362130174 is beyond EOD, truncated [ 829.698138][ T4824] loop5: p2 start 1256873442 is beyond EOD, truncated [ 829.831736][ T4824] Dev loop5: unable to read RDB block 9 [ 829.847566][ T4824] loop5: AHDI p1 p2 p4 [ 829.873369][ T4824] loop5: partition table partially beyond EOD, truncated [ 829.905764][ T4824] loop5: p1 start 1362130174 is beyond EOD, truncated [ 829.914417][ T4824] loop5: p2 start 1256873442 is beyond EOD, truncated 06:42:32 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="ae02e0285451423020bf4bb1f233a32d034ce718517fcc6feba8e13da3f25b822c0caedef77480025ed03931ee0b25e16c2376dc14f2a83a792218e2b0b46859f6298e099db7873db886a5c2ec0af2826d2a73e5d79e78a2715eec7f36ebcb312e87f7daeb6e6ecce7f88fbeb7f8890e11d6b35f2e49df09ca6eebc2f0835a280ad84abbc9b3ed31e1438048ff5afe722d3ed3a1af7a6c3e7f07f4a4de58443e264fc6d7335bd326c747772daea7f42d3931f7c59a4749d5e442256b10b60b27f3275ff8c981b2a4af2c283fb1f40cde0ba30ee1fc087f1171c45758df7897fa1b2ac8495490210035d99bf4909d8c905b0260dbac903596c5c7839b193cf57c796bd3b69490f7bd0adfebdb296ecfa3cc994d1e7b76d5b694b00bb8d679376928697520adbcef9b513fcc92f216420ea95f9fc5e71fd22a982563cf9b4cec57ac66cc420d94c88569f5a715292bd8450735cff08fd4f684400190df78a309c02f3fefe507231903f56f4f2fccbd37fb5d54441029b822f4ceccc68adadfdd458ec5c89d2982343c0cd23039db490f92a3541b049763d04c66c08bca633fb681f0a757506766488271f7d3d8375ce360c3bc1ff3820b62875ad7521b34dce16e3ec439ad7219f0513074fe296b1cfa7fd5d05f4aea5de26fa70bd4e6c0934c0a11af974a066df40f61434a", 0x1eb, 0x3}]) 06:42:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imadig'}, {@hash='hash'}]}) 06:42:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:32 executing program 1: r0 = openat$sequencer2(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$TCSETS(r0, 0x5402, 0x0) socket$nl_route(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(r1, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r2 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) pipe(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write(r4, &(0x7f0000000340), 0x41395527) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, &(0x7f0000000840)) mkdir(&(0x7f0000000100)='./file0\x00', 0x1) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_open_dev$sndctrl(0x0, 0x0, 0x0) add_key$user(&(0x7f0000000180)='user\x00', 0x0, &(0x7f0000000240)='X', 0x1, 0xfffffffffffffffe) r5 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz'}, 0x0, 0x0, 0xfffffffffffffffb) r6 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x4bd, r6) r7 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f00000007c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) r8 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x1001, r7) keyctl$read(0xb, r8, &(0x7f0000005340)=""/4096, 0xd900) keyctl$unlink(0x4, r5, r8) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000280)) r9 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFADDR(r9, 0x8914, &(0x7f0000000000)={'lo:\x05\xe6\r\x00\t\x02\x00', {0x2, 0x0, @empty}}) fstat(r9, &(0x7f0000000540)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb), &(0x7f0000cab000)=0xc) 06:42:32 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000000)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee3, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0}) 06:42:32 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffda}}}, 0x78) 06:42:33 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_timeval(r0, 0xffff, 0x4, &(0x7f0000001080), 0x10) recvfrom$inet(r0, 0x0, 0xd85bc68d, 0x0, 0x0, 0x800e005ad) shutdown(r0, 0x0) 06:42:33 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78}, 0x78) 06:42:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000000)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee3, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0}) [ 830.417904][ T4879] Dev loop5: unable to read RDB block 9 [ 830.453791][ T4879] loop5: AHDI p1 p2 p4 06:42:33 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}}, 0x78) [ 830.521378][ T4879] loop5: partition table partially beyond EOD, truncated 06:42:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 830.570123][ T4879] loop5: p1 start 1362130174 is beyond EOD, truncated [ 830.582444][ T4879] loop5: p2 start 1256873442 is beyond EOD, truncated [ 830.646414][ T4864] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value [ 830.727683][ T4879] Dev loop5: unable to read RDB block 9 [ 830.737243][ T4879] loop5: AHDI p1 p2 p4 [ 830.742413][ T4879] loop5: partition table partially beyond EOD, truncated [ 830.767442][ T4879] loop5: p1 start 1362130174 is beyond EOD, truncated [ 830.801868][ T4879] loop5: p2 start 1256873442 is beyond EOD, truncated 06:42:33 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="ae02e0285451423020bf4bb1f233a32d034ce718517fcc6feba8e13da3f25b822c0caedef77480025ed03931ee0b25e16c2576dc14f2a83a792218e2b0b46859f6298e099db7873db886a5c2ec0af2826d2a73e5d79e78a2715eec7f36ebcb312e87f7daeb6e6ecce7f88fbeb7f8890e11d6b35f2e49df09ca6eebc2f0835a280ad84abbc9b3ed31e1438048ff5afe722d3ed3a1af7a6c3e7f07f4a4de58443e264fc6d7335bd326c747772daea7f42d3931f7c59a4749d5e442256b10b60b27f3275ff8c981b2a4af2c283fb1f40cde0ba30ee1fc087f1171c45758df7897fa1b2ac8495490210035d99bf4909d8c905b0260dbac903596c5c7839b193cf57c796bd3b69490f7bd0adfebdb296ecfa3cc994d1e7b76d5b694b00bb8d679376928697520adbcef9b513fcc92f216420ea95f9fc5e71fd22a982563cf9b4cec57ac66cc420d94c88569f5a715292bd8450735cff08fd4f684400190df78a309c02f3fefe507231903f56f4f2fccbd37fb5d54441029b822f4ceccc68adadfdd458ec5c89d2982343c0cd23039db490f92a3541b049763d04c66c08bca633fb681f0a757506766488271f7d3d8375ce360c3bc1ff3820b62875ad7521b34dce16e3ec439ad7219f0513074fe296b1cfa7fd5d05f4aea5de26fa70bd4e6c0934c0a11af974a066df40f61434a", 0x1eb, 0x3}]) 06:42:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000000)={0x4, 0xffffffffffffffff}) ioctl$KVM_SET_DEVICE_ATTR(r2, 0x4018aee3, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0}) 06:42:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:33 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}}, 0x78) 06:42:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imaiig'}, {@hash='hash'}]}) 06:42:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) 06:42:34 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}}, 0x78) 06:42:34 executing program 0: ioctl(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7ffffffb}]}) [ 831.309842][ T4919] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value [ 831.346280][ T4934] Dev loop5: unable to read RDB block 9 [ 831.351885][ T4934] loop5: AHDI p1 p2 p4 06:42:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imalig'}, {@hash='hash'}]}) 06:42:34 executing program 1: perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x2b, 0x1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000000), 0x10000000000001f8}, 0x0) getpid() r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000000000000}, 0x20, 0x1f, 0x0, 0x3, 0x8}, 0x0, 0x0, r1, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000001900)={'ip6gretap0\x00', 0x1}) r2 = openat$cgroup_subtree(r1, &(0x7f00000000c0)='cgroup.subtree_control\x00', 0x2, 0x0) close(r2) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000000000000}, 0x20, 0x1f, 0x0, 0x3, 0x8}, 0x0, 0x0, r3, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000001900)={'ip6gretap0\x00', 0x1}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r3, 0x0, 0x59, 0xa8, &(0x7f0000000100)="f1b9c95d9274a53f85cbb84820e0173b610df39e32b5fbd3afe2b9cddd02b3f729420113c57a5ae078cc993df3b4b51b9a1f11b83b1043d0d99c690562c4af9b6a2e5edee5fce02b614c120c0187f088057195d17b9396b3ee", &(0x7f0000000180)=""/168, 0x0, 0x0, 0xd7, 0x2c, &(0x7f0000000240)="dc15c0065eec3258ef64b32692c889cfe81f8c4e2d7d3f5022be2003c2f84f6016dc4bd04ec49547d990db2986f1d32a733dd961d7810bbd5b76c6c2f10bc6bd5d85bb296697fd7907ce007a78cb38f536cd75565c432c7b0eef759832175d790bee8d2836a7aad7c6e4de8376a843743d18ca492b351b9f93130c4204176fa66ca31c6925f51b9b5007be98628ff97ec0f19a938ac1e991f796e5595fd7067bc3d28d156c47cd008d6ecf6fc966759b1192faa4bc168ff9d6f3706a0d583bfbc57c3788e603200ccb85d3b600fd765a9c916ff8b3ff1d", &(0x7f0000000340)="7ab3a4c3033cc2310c57fcc21c092cce3cfddce5aa38e2c1e5d76cc30cb203cac119672079a5cd2061151961"}, 0x40) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'all\x00\x19\x00\x00!C\x19\xb2d\xb4\xa0\xb4v', 0x420000015001}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 06:42:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) [ 831.434265][ T4934] loop5: partition table partially beyond EOD, truncated [ 831.482559][ T4934] loop5: p1 start 1362130174 is beyond EOD, truncated [ 831.508758][ T4934] loop5: p2 start 1256873442 is beyond EOD, truncated [ 831.684265][ T4934] Dev loop5: unable to read RDB block 9 [ 831.690002][ T4934] loop5: AHDI p1 p2 p4 [ 831.739950][ T4934] loop5: partition table partially beyond EOD, truncated [ 831.786833][ T4934] loop5: p1 start 1362130174 is beyond EOD, truncated [ 831.794317][ T4934] loop5: p2 start 1256873442 is beyond EOD, truncated 06:42:34 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="ae02e0285451423020bf4bb1f233a32d034ce718517fcc6feba8e13da3f25b822c0caedef77480025ed03931ee0b25e16c2a76dc14f2a83a792218e2b0b46859f6298e099db7873db886a5c2ec0af2826d2a73e5d79e78a2715eec7f36ebcb312e87f7daeb6e6ecce7f88fbeb7f8890e11d6b35f2e49df09ca6eebc2f0835a280ad84abbc9b3ed31e1438048ff5afe722d3ed3a1af7a6c3e7f07f4a4de58443e264fc6d7335bd326c747772daea7f42d3931f7c59a4749d5e442256b10b60b27f3275ff8c981b2a4af2c283fb1f40cde0ba30ee1fc087f1171c45758df7897fa1b2ac8495490210035d99bf4909d8c905b0260dbac903596c5c7839b193cf57c796bd3b69490f7bd0adfebdb296ecfa3cc994d1e7b76d5b694b00bb8d679376928697520adbcef9b513fcc92f216420ea95f9fc5e71fd22a982563cf9b4cec57ac66cc420d94c88569f5a715292bd8450735cff08fd4f684400190df78a309c02f3fefe507231903f56f4f2fccbd37fb5d54441029b822f4ceccc68adadfdd458ec5c89d2982343c0cd23039db490f92a3541b049763d04c66c08bca633fb681f0a757506766488271f7d3d8375ce360c3bc1ff3820b62875ad7521b34dce16e3ec439ad7219f0513074fe296b1cfa7fd5d05f4aea5de26fa70bd4e6c0934c0a11af974a066df40f61434a", 0x1eb, 0x3}]) 06:42:34 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}}}, 0x78) 06:42:34 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = dup2(r0, r0) shmat(0xffffffffffffffff, &(0x7f0000ffb000/0x4000)=nil, 0x0) shmdt(0x0) recvfrom$inet(r0, 0x0, 0xfffffdbb, 0x2, 0x0, 0x800e004de) shutdown(r1, 0x0) 06:42:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) 06:42:34 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd}}}, 0x78) [ 831.985851][ T4956] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value 06:42:34 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24}}}, 0x78) 06:42:34 executing program 0: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, 0x0}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f00000001c0), 0xfffffef3) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) [ 832.044654][ T4974] Dev loop5: unable to read RDB block 9 [ 832.052985][ T4974] loop5: AHDI p1 p2 p4 [ 832.061461][ T4974] loop5: partition table partially beyond EOD, truncated [ 832.069906][ T4974] loop5: p1 start 1362130174 is beyond EOD, truncated [ 832.078796][ T4974] loop5: p2 start 1256873442 is beyond EOD, truncated 06:42:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) keyctl$dh_compute(0x17, &(0x7f0000000000)={0x0, r1}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:34 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) creat(&(0x7f0000000300)='./file0\x00', 0x0) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='devpts\x00', 0x0, &(0x7f00000001c0)='/selinux/policy\x00') r2 = gettid() tkill(r2, 0x3c) prlimit64(0x0, 0xe, 0x0, 0x0) getpid() socket$inet6(0xa, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000), 0x0, 0x0) [ 832.293338][ T4974] Dev loop5: unable to read RDB block 9 [ 832.298990][ T4974] loop5: AHDI p1 p2 p4 [ 832.335458][ T4974] loop5: partition table partially beyond EOD, truncated [ 832.343438][ T4974] loop5: p1 start 1362130174 is beyond EOD, truncated [ 832.350605][ T4974] loop5: p2 start 1256873442 is beyond EOD, truncated 06:42:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imaoig'}, {@hash='hash'}]}) 06:42:35 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x57}}}, 0x78) 06:42:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) keyctl$dh_compute(0x17, &(0x7f0000000000)={0x0, r1}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 832.393117][ T4994] devpts: called with bogus options 06:42:35 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:42:35 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f00000001c0)) sched_setscheduler(r0, 0x6, &(0x7f0000000100)=0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000740)=ANY=[@ANYBLOB="0300000000000800000000000062a3e990bcbfe1c943b28cc35e2cadfe14c7998c7383fd0253aa9f490a53ca1e0a43fe77e493d5077c39ad96bc1ec8c53d6fef2c8b684762d907665ebfee4ce3d8263caf0000000000001dd21d4135a27a90a938510faba6ae1f126b6c4af187bbbff8ea5c2a5236e66c43c033e3dfc6a7940e"], 0x1}}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xffffffffffffff7f) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000080)="baa100b000eef36cba2100ec66b9800000c00f326635001000000f30bad104ecc80080d267d9f8f30f1bb429000f20c06635200000000f22c067f3af", 0x3c}], 0x1, 0x0, 0x0, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x82800) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x0, 0x0) poll(&(0x7f0000000200)=[{r5}], 0x1, 0x0) sendto$rxrpc(r5, &(0x7f00000007c0)="7713886ea055f93bff248ebe69d42b8a5b7790546d0fa715681eb11c0f9a0e87ab96ee4dc21ac46b773851da66a5d51bcb7b24e4522ac851106e42b0105d46732c08dce4c3317e6babf5c8522a85127bb79f652d362dabdf7ed6eea2fbddb9faeadbc21f6b8718040789e96e37b5ecf02ac284e57ab2eb2a69e32444b9dd05b805fa2e9f8c672def115b82ca11c70ecf002fce0cbe567129334cfb05909caa99f724dc943b76c29851a85d2b665e9123d130c78802a05d330cf2fcee0d8d55f1fdcefb8f74ec11dede5f227cad003f0d1fac5b6721efe7ada5492b6567d92d94c07aa9", 0xe3, 0x20000010, 0x0, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000380)) ioctl$KVM_GET_PIT(r4, 0xc048ae65, &(0x7f0000000440)) r7 = getpgrp(0x0) setpriority(0x0, r7, 0xffff) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x10, 0x0, 0x0, 0x50d, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}}, r7, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x1000, &(0x7f0000000000/0x1000)=nil}) ioctl$KVM_SET_REGS(r6, 0x4090ae82, &(0x7f0000000200)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff], 0x1f000}) ioctl$KVM_RUN(r6, 0xae80, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395662) sched_getscheduler(0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x1, 0x0, 0xd5, 0x1ff}) lstat(&(0x7f0000000340)='./file0/file0\x00', &(0x7f00000004c0)) clone3(&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) rt_sigaction(0x23, &(0x7f0000000600)={&(0x7f00000003c0)="660f38335a003606aff30f5314dfc4e1705e7f0ec4e299aea374da078a3e36660f1adb0f5f0ac4c201aca002000000d2b108000000", {0xd6}, 0xa8b44fcded2f4782, &(0x7f0000000400)="c4e3896d138265f20f1bd7c4c155eaebc704ac02000000c4c255b80ec4e209a8d1f2f08169ef00000000c4e3b5ce910500000023d8c0c4c3b50cf6ce"}, &(0x7f00000006c0)={&(0x7f0000000640)="c4c3b90d404c8c650f170f2ef3a73e0fc6beec1f000000f36ef2adf2260ad9c4e2bd2bf8670f9e960000835ce4656a", {}, 0x0, &(0x7f0000000680)="d91f65f20f2b4a65f3e1058fc978d6660fc4c27d18c567660f6f1f26660f38f6c1c4c395420a00c4e37d7bd6d16465dbe4"}, 0x8, &(0x7f0000000700)) 06:42:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) keyctl$dh_compute(0x17, &(0x7f0000000000)={0x0, r1}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:35 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900}}}, 0x78) 06:42:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r0, 0x0, r0}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 832.690587][ T5008] Dev loop5: unable to read RDB block 9 [ 832.733049][ T5008] loop5: AHDI p1 p2 p4 [ 832.777355][ T5008] loop5: partition table partially beyond EOD, truncated 06:42:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r0, 0x0, r0}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 832.848845][ T5008] loop5: p1 start 1362130174 is beyond EOD, truncated [ 832.882791][ T5008] loop5: p2 start 1256873442 is beyond EOD, truncated [ 832.895369][ T5014] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value [ 833.013322][ T5008] Dev loop5: unable to read RDB block 9 [ 833.020272][ T5008] loop5: AHDI p1 p2 p4 [ 833.030459][ T5008] loop5: partition table partially beyond EOD, truncated [ 833.041275][ T5008] loop5: p1 start 1362130174 is beyond EOD, truncated [ 833.050211][ T5008] loop5: p2 start 1256873442 is beyond EOD, truncated 06:42:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_timeval(r0, 0xffff, 0x4, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xd85bc68d, 0x2, 0x0, 0x800e005ad) shutdown(r0, 0x0) 06:42:36 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00}}}, 0x78) 06:42:36 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:42:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imapig'}, {@hash='hash'}]}) 06:42:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r0, 0x0, r0}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:36 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2400}}}, 0x78) 06:42:36 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00}}}, 0x78) [ 833.983356][ T5053] Dev loop5: unable to read RDB block 9 [ 834.039539][ T5053] loop5: AHDI p1 p2 p4 [ 834.082569][ T5053] loop5: partition table partially beyond EOD, truncated [ 834.103927][ T5053] loop5: p1 start 1362130174 is beyond EOD, truncated [ 834.110924][ T5053] loop5: p2 start 1256873442 is beyond EOD, truncated [ 834.256330][ T5053] Dev loop5: unable to read RDB block 9 [ 834.266927][ T5053] loop5: AHDI p1 p2 p4 [ 834.284678][ T5052] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value [ 834.322068][ T5053] loop5: partition table partially beyond EOD, truncated [ 834.333615][ T5053] loop5: p1 start 1362130174 is beyond EOD, truncated [ 834.340498][ T5053] loop5: p2 start 1256873442 is beyond EOD, truncated 06:42:37 executing program 1: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000107ff8)={0x0, 0x10040000}, 0x8) connect$inet6(r0, &(0x7f00008c0000)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000000)={0x0, 0x9}, 0x8) 06:42:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, 0x0) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r0, r1}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:37 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 06:42:37 executing program 0: socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7ffffffb}]}) 06:42:37 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="ae02e0285451423020bf4bb1f233a32d034ce718517fcc6feba8e13da3f25b822c0caedef77480025ed03931ee0b25e16c2e76dc14f2a83a792218e2b0b46859f6298e099db7873db886a5c2ec0af2826d2a73e5d79e78a2715eec7f36ebcb312e87f7daeb6e6ecce7f88fbeb7f8890e11d6b35f2e49df09ca6eebc2f0835a280ad84abbc9b3ed31e1438048ff5afe722d3ed3a1af7a6c3e7f07f4a4de58443e264fc6d7335bd326c747772daea7f42d3931f7c59a4749d5e442256b10b60b27f3275ff8c981b2a4af2c283fb1f40cde0ba30ee1fc087f1171c45758df7897fa1b2ac8495490210035d99bf4909d8c905b0260dbac903596c5c7839b193cf57c796bd3b69490f7bd0adfebdb296ecfa3cc994d1e7b76d5b694b00bb8d679376928697520adbcef9b513fcc92f216420ea95f9fc5e71fd22a982563cf9b4cec57ac66cc420d94c88569f5a715292bd8450735cff08fd4f684400190df78a309c02f3fefe507231903f56f4f2fccbd37fb5d54441029b822f4ceccc68adadfdd458ec5c89d2982343c0cd23039db490f92a3541b049763d04c66c08bca633fb681f0a757506766488271f7d3d8375ce360c3bc1ff3820b62875ad7521b34dce16e3ec439ad7219f0513074fe296b1cfa7fd5d05f4aea5de26fa70bd4e6c0934c0a11af974a066df40f61434a", 0x1eb, 0x3}]) 06:42:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imauig'}, {@hash='hash'}]}) 06:42:37 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000002000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_SET_NESTED_STATE(r2, 0x4080aebf, &(0x7f00000002c0)={0x0, 0x0, 0x2080, {}, [], "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", "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"}) [ 834.859241][ T5090] Dev loop5: unable to read RDB block 9 [ 834.954171][ T5090] loop5: AHDI p1 p2 p4 [ 834.966452][ T5090] loop5: partition table partially beyond EOD, truncated 06:42:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, 0x0) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r0, r1}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:37 executing program 0: [ 835.020935][ T5090] loop5: p1 start 1362130174 is beyond EOD, truncated 06:42:37 executing program 1: 06:42:37 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5700}}}, 0x78) [ 835.079608][ T5090] loop5: p2 start 1256873442 is beyond EOD, truncated [ 835.087459][ T5089] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value 06:42:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, 0x0) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r0, r1}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imaxig'}, {@hash='hash'}]}) 06:42:38 executing program 0: [ 835.337448][ T5090] Dev loop5: unable to read RDB block 9 06:42:38 executing program 1: [ 835.389045][ T5090] loop5: AHDI p1 p2 p4 [ 835.467955][ T5090] loop5: partition table partially beyond EOD, truncated [ 835.520503][ T5090] loop5: p1 start 1362130174 is beyond EOD, truncated [ 835.620800][ T5130] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value [ 835.640338][ T5090] loop5: p2 start 1256873442 is beyond EOD, truncated 06:42:38 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="ae02e0285451423020bf4bb1f233a32d034ce718517fcc6feba8e13da3f25b822c0caedef77480025ed03931ee0b25e16c3076dc14f2a83a792218e2b0b46859f6298e099db7873db886a5c2ec0af2826d2a73e5d79e78a2715eec7f36ebcb312e87f7daeb6e6ecce7f88fbeb7f8890e11d6b35f2e49df09ca6eebc2f0835a280ad84abbc9b3ed31e1438048ff5afe722d3ed3a1af7a6c3e7f07f4a4de58443e264fc6d7335bd326c747772daea7f42d3931f7c59a4749d5e442256b10b60b27f3275ff8c981b2a4af2c283fb1f40cde0ba30ee1fc087f1171c45758df7897fa1b2ac8495490210035d99bf4909d8c905b0260dbac903596c5c7839b193cf57c796bd3b69490f7bd0adfebdb296ecfa3cc994d1e7b76d5b694b00bb8d679376928697520adbcef9b513fcc92f216420ea95f9fc5e71fd22a982563cf9b4cec57ac66cc420d94c88569f5a715292bd8450735cff08fd4f684400190df78a309c02f3fefe507231903f56f4f2fccbd37fb5d54441029b822f4ceccc68adadfdd458ec5c89d2982343c0cd23039db490f92a3541b049763d04c66c08bca633fb681f0a757506766488271f7d3d8375ce360c3bc1ff3820b62875ad7521b34dce16e3ec439ad7219f0513074fe296b1cfa7fd5d05f4aea5de26fa70bd4e6c0934c0a11af974a066df40f61434a", 0x1eb, 0x3}]) 06:42:38 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}}}, 0x78) 06:42:38 executing program 0: 06:42:38 executing program 1: 06:42:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imas%g'}, {@hash='hash'}]}) 06:42:38 executing program 1: 06:42:38 executing program 0: 06:42:38 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}}}, 0x78) 06:42:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 836.036342][ T5152] Dev loop5: unable to read RDB block 9 [ 836.075383][ T5152] loop5: AHDI p1 p2 p4 06:42:38 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}}}, 0x78) [ 836.100569][ T5152] loop5: partition table partially beyond EOD, truncated [ 836.182564][ T5152] loop5: p1 start 1362130174 is beyond EOD, truncated 06:42:39 executing program 1: [ 836.248949][ T5152] loop5: p2 start 1256873442 is beyond EOD, truncated [ 836.400750][ T5152] Dev loop5: unable to read RDB block 9 [ 836.418551][ T5152] loop5: AHDI p1 p2 p4 [ 836.446190][ T5154] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value [ 836.463041][ T5152] loop5: partition table partially beyond EOD, truncated [ 836.470366][ T5152] loop5: p1 start 1362130174 is beyond EOD, truncated [ 836.477446][ T5152] loop5: p2 start 1256873442 is beyond EOD, truncated 06:42:39 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:42:39 executing program 0: 06:42:39 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}}}, 0x78) 06:42:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:39 executing program 1: 06:42:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imas\\g'}, {@hash='hash'}]}) 06:42:39 executing program 1: 06:42:39 executing program 0: 06:42:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:39 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000}}}, 0x78) 06:42:39 executing program 1: [ 836.854416][ T5190] Dev loop5: unable to read RDB block 9 [ 836.884724][ T5190] loop5: AHDI p1 p2 p4 [ 836.888964][ T5190] loop5: partition table partially beyond EOD, truncated 06:42:39 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 836.942530][ T5190] loop5: p1 start 1362130174 is beyond EOD, truncated [ 836.949357][ T5190] loop5: p2 start 1256873442 is beyond EOD, truncated [ 837.087031][ T5190] Dev loop5: unable to read RDB block 9 [ 837.097302][ T5190] loop5: AHDI p1 p2 p4 [ 837.110011][ T5190] loop5: partition table partially beyond EOD, truncated [ 837.128034][ T5190] loop5: p1 start 1362130174 is beyond EOD, truncated [ 837.130348][ T5188] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value [ 837.144497][ T5190] loop5: p2 start 1256873442 is beyond EOD, truncated 06:42:40 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:42:40 executing program 1: 06:42:40 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:40 executing program 0: 06:42:40 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000}}}, 0x78) 06:42:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imasig', 0x7}, {@hash='hash'}]}) 06:42:40 executing program 1: 06:42:40 executing program 0: 06:42:40 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000}}}, 0x78) 06:42:40 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:40 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000}}}, 0x78) [ 837.482489][ T5225] Dev loop5: unable to read RDB block 9 [ 837.488122][ T5225] loop5: AHDI p1 p2 p4 06:42:40 executing program 1: [ 837.662660][ T5225] loop5: partition table partially beyond EOD, truncated [ 837.676671][ T5225] loop5: p1 start 1362130174 is beyond EOD, truncated [ 837.713274][ T5225] loop5: p2 start 1256873442 is beyond EOD, truncated 06:42:40 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:42:40 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:40 executing program 0: 06:42:40 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}}}, 0x78) 06:42:40 executing program 1: [ 837.943345][ T5243] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value 06:42:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imasig', 0x3c}, {@hash='hash'}]}) 06:42:40 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x57000000}}}, 0x78) 06:42:40 executing program 0: 06:42:40 executing program 1: 06:42:40 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:40 executing program 0: [ 838.093543][ T5260] Dev loop5: unable to read RDB block 9 [ 838.103112][ T5260] loop5: AHDI p1 p2 p4 [ 838.124296][ T5260] loop5: partition table partially beyond EOD, truncated [ 838.132695][ T5260] loop5: p1 start 1362130174 is beyond EOD, truncated [ 838.186723][ T5260] loop5: p2 start 1256873442 is beyond EOD, truncated 06:42:41 executing program 0: [ 838.403731][ T5260] Dev loop5: unable to read RDB block 9 [ 838.409475][ T5260] loop5: AHDI p1 p2 p4 [ 838.409489][ T5260] loop5: partition table partially beyond EOD, truncated [ 838.478401][ T5260] loop5: p1 start 1362130174 is beyond EOD, truncated [ 838.514000][ T5260] loop5: p2 start 1256873442 is beyond EOD, truncated 06:42:41 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:42:41 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:41 executing program 0: 06:42:41 executing program 1: 06:42:41 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdaffffff}}}, 0x78) [ 838.577456][ T5266] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value 06:42:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imasig'}, {@hash='h\\sh'}]}) 06:42:41 executing program 0: 06:42:41 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffda}}}, 0x78) 06:42:41 executing program 1: 06:42:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 838.854284][ T5296] Dev loop5: unable to read RDB block 9 [ 838.860476][ T5296] loop5: AHDI p1 p2 p4 [ 838.888175][ T5296] loop5: partition table partially beyond EOD, truncated 06:42:41 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78}, 0x78) 06:42:41 executing program 0: [ 838.992397][ T5296] loop5: p1 start 1362130174 is beyond EOD, truncated [ 839.037974][ T5296] loop5: p2 start 1256873442 is beyond EOD, truncated [ 839.153854][ T5296] Dev loop5: unable to read RDB block 9 [ 839.227615][ T5301] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value [ 839.230338][ T5296] loop5: AHDI p1 p2 p4 [ 839.246313][ T5296] loop5: partition table partially beyond EOD, truncated [ 839.253934][ T5296] loop5: p1 start 1362130174 is beyond EOD, truncated [ 839.260875][ T5296] loop5: p2 start 1256873442 is beyond EOD, truncated 06:42:42 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:42:42 executing program 1: 06:42:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:42 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}}, 0x78) 06:42:42 executing program 0: 06:42:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imasig'}, {@hash='ha#h'}]}) 06:42:42 executing program 1: 06:42:42 executing program 0: 06:42:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:42 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}}, 0x78) [ 839.603494][ T5334] Dev loop5: unable to read RDB block 9 [ 839.616516][ T5334] loop5: AHDI p1 p2 p4 [ 839.620939][ T5334] loop5: partition table partially beyond EOD, truncated [ 839.632921][ T5334] loop5: p1 start 1362130174 is beyond EOD, truncated [ 839.640079][ T5334] loop5: p2 start 1256873442 is beyond EOD, truncated 06:42:42 executing program 1: 06:42:42 executing program 0: [ 839.892676][ T5334] Dev loop5: unable to read RDB block 9 [ 839.898507][ T5334] loop5: AHDI p1 p2 p4 [ 839.945014][ T5334] loop5: partition table partially beyond EOD, truncated [ 840.002430][ T5334] loop5: p1 start 1362130174 is beyond EOD, truncated [ 840.009520][ T5334] loop5: p2 start 1256873442 is beyond EOD, truncated 06:42:42 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:42:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:42 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}}, 0x78) 06:42:42 executing program 1: 06:42:42 executing program 0: [ 840.112953][ T5336] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value 06:42:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imasig'}, {@hash='ha%h'}]}) 06:42:43 executing program 1: 06:42:43 executing program 0: 06:42:43 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}}}, 0x78) 06:42:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:43 executing program 0: [ 840.377557][ T5369] Dev loop5: unable to read RDB block 9 06:42:43 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd}}}, 0x78) [ 840.490132][ T5369] loop5: AHDI p1 p2 p4 [ 840.592894][ T5369] loop5: partition table partially beyond EOD, truncated [ 840.600278][ T5369] loop5: p1 start 1362130174 is beyond EOD, truncated [ 840.712283][ T5369] loop5: p2 start 1256873442 is beyond EOD, truncated [ 840.800477][ T5379] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value [ 840.844673][ T5369] Dev loop5: unable to read RDB block 9 [ 840.850735][ T5369] loop5: AHDI p1 p2 p4 [ 840.860050][ T5369] loop5: partition table partially beyond EOD, truncated [ 840.868434][ T5369] loop5: p1 start 1362130174 is beyond EOD, truncated [ 840.875455][ T5369] loop5: p2 start 1256873442 is beyond EOD, truncated 06:42:43 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:42:43 executing program 0: 06:42:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:43 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24}}}, 0x78) 06:42:43 executing program 1: 06:42:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imasig'}, {@hash='ha*h'}]}) 06:42:43 executing program 1: 06:42:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:43 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x0, 0x0) pread64(r0, &(0x7f00000000c0)=""/57, 0x39, 0x0) 06:42:43 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x57}}}, 0x78) [ 841.194314][ T5409] Dev loop5: unable to read RDB block 9 [ 841.199964][ T5409] loop5: AHDI p1 p2 p4 06:42:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_timeval(r0, 0xffff, 0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xd85bc68d, 0x2, 0x0, 0x800e005ad) shutdown(r0, 0x0) 06:42:44 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900}}}, 0x78) [ 841.318475][ T5409] loop5: partition table partially beyond EOD, truncated [ 841.362908][ T5409] loop5: p1 start 1362130174 is beyond EOD, truncated [ 841.373619][ T5409] loop5: p2 start 1256873442 is beyond EOD, truncated [ 841.473756][ T5409] Dev loop5: unable to read RDB block 9 [ 841.481907][ T5409] loop5: AHDI p1 p2 p4 [ 841.500247][ T5409] loop5: partition table partially beyond EOD, truncated [ 841.512065][ T5409] loop5: p1 start 1362130174 is beyond EOD, truncated [ 841.526396][ T5409] loop5: p2 start 1256873442 is beyond EOD, truncated [ 841.564077][ T5403] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value 06:42:44 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:42:44 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00}}}, 0x78) 06:42:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x1, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x89e7, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0x0) 06:42:44 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2400}}}, 0x78) 06:42:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imasig'}, {@hash='ha+h'}]}) 06:42:44 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000640)={{}, 0x0, 0x400, 0x0, 0x1ff}) 06:42:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 841.808696][ T5445] Dev loop5: unable to read RDB block 9 [ 841.831392][ T5445] loop5: AHDI p1 p2 p4 [ 841.845973][ T5445] loop5: partition table partially beyond EOD, truncated [ 841.870975][ T5445] loop5: p1 start 1362130174 is beyond EOD, truncated [ 841.896529][ T5445] loop5: p2 start 1256873442 is beyond EOD, truncated 06:42:44 executing program 0: sendmsg(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000140), 0xffffffaa}], 0x3}, 0x0) clone(0x800007fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="13d50f34"], 0x4}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000002c0)=ANY=[@ANYRESOCT, @ANYBLOB="27fb1299e4fd3329137c495a519f5cbbc5b9c6fab5f3020449d80a91f54bbeae0ac0df19e4e33ec4a3a933a7f8cf9d024714db9fc0ba87957bcd818a047fd5372ba53a64"], 0x0, 0x5b}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 06:42:44 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00}}}, 0x78) 06:42:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:44 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) [ 842.105073][ T5452] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value 06:42:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:44 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 06:42:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, 0x0) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r0, r1}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 842.160075][ T5473] ptrace attach of "/root/syz-executor.0"[5472] was attempted by "/root/syz-executor.0"[5473] 06:42:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imasig'}, {@hash='ha-h'}]}) 06:42:45 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5700}}}, 0x78) [ 842.294234][ T5477] loop5: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 842.301900][ T5477] loop5: p1 start 540033617 is beyond EOD, truncated 06:42:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:45 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}}}, 0x78) [ 842.482447][ T5477] loop5: p2 start 4158565900 is beyond EOD, truncated [ 842.494128][ T5477] loop5: p3 start 4133054644 is beyond EOD, truncated 06:42:45 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}}}, 0x78) [ 842.537730][ T5477] loop5: p4 start 914353246 is beyond EOD, truncated [ 842.575131][ T5477] loop5: p5 start 3389644617 is beyond EOD, truncated 06:42:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 842.597858][ T5477] loop5: p6 start 2946618174 is beyond EOD, truncated [ 842.612646][ T5477] loop5: p7 start 959313063 is beyond EOD, truncated [ 842.622055][ T5477] loop5: p8 start 2973706284 is beyond EOD, truncated [ 842.650124][ T5477] loop5: p9 start 889201040 is beyond EOD, truncated [ 842.678608][ T5477] loop5: p10 start 2495009643 is beyond EOD, truncated 06:42:45 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r0, 0x0, r0}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 842.713738][ T5477] loop5: p11 start 677984121 is beyond EOD, truncated [ 842.800098][ T5477] loop5: p12 start 2614059813 is beyond EOD, truncated [ 842.976631][ T5502] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value [ 842.984752][ T5477] loop5: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 843.002315][ T5477] loop5: p1 start 540033617 is beyond EOD, truncated [ 843.009047][ T5477] loop5: p2 start 4158565900 is beyond EOD, truncated [ 843.016101][ T5477] loop5: p3 start 4133054644 is beyond EOD, truncated [ 843.022951][ T5477] loop5: p4 start 914353246 is beyond EOD, truncated [ 843.022964][ T5477] loop5: p5 start 3389644617 is beyond EOD, truncated [ 843.022976][ T5477] loop5: p6 start 2946618174 is beyond EOD, truncated [ 843.022987][ T5477] loop5: p7 start 959313063 is beyond EOD, truncated [ 843.022999][ T5477] loop5: p8 start 2973706284 is beyond EOD, truncated [ 843.023010][ T5477] loop5: p9 start 889201040 is beyond EOD, truncated [ 843.023022][ T5477] loop5: p10 start 2495009643 is beyond EOD, truncated [ 843.023033][ T5477] loop5: p11 start 677984121 is beyond EOD, truncated [ 843.023045][ T5477] loop5: p12 start 2614059813 is beyond EOD, truncated 06:42:45 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:42:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(0x0, &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:45 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imalig'}, {@hash='hash'}]}) 06:42:45 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}}}, 0x78) 06:42:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imasig'}, {@hash='ha.h'}]}) 06:42:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) keyctl$dh_compute(0x17, &(0x7f0000000000)={0x0, r1}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:46 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}}}, 0x78) [ 843.333107][ T5537] Dev loop5: unable to read RDB block 9 [ 843.352911][ T5537] loop5: AHDI p1 p2 p4 [ 843.357258][ T5537] loop5: partition table partially beyond EOD, truncated [ 843.365467][ T5537] loop5: p1 start 1362130174 is beyond EOD, truncated [ 843.372885][ T5537] loop5: p2 start 1256873442 is beyond EOD, truncated 06:42:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(0x0, &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:46 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000}}}, 0x78) [ 843.510550][ T5537] Dev loop5: unable to read RDB block 9 [ 843.518913][ T5537] loop5: AHDI p1 p2 p4 [ 843.531000][ T5532] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value [ 843.577499][ T5537] loop5: partition table partially beyond EOD, truncated [ 843.590381][ T5529] FAT-fs (loop1): Unrecognized mount option "fowner<00000000000000000000" or missing value 06:42:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imasig'}, {@hash='ha0h'}]}) [ 843.656046][ T5537] loop5: p1 start 1362130174 is beyond EOD, truncated [ 843.671790][ T5537] loop5: p2 start 1256873442 is beyond EOD, truncated 06:42:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(0x0, &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:46 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:42:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(0x0, &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) 06:42:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:46 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000}}}, 0x78) 06:42:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 844.039364][ T5558] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value [ 844.072322][ T5573] Dev loop5: unable to read RDB block 9 [ 844.083040][ T5573] loop5: AHDI p1 p2 p4 [ 844.087249][ T5573] loop5: partition table partially beyond EOD, truncated 06:42:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imasig'}, {@hash='haXh'}]}) [ 844.114260][ T5573] loop5: p1 start 1362130174 is beyond EOD, truncated 06:42:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 844.208263][ T5573] loop5: p2 start 1256873442 is beyond EOD, truncated [ 844.246014][ T5584] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value 06:42:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:47 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000}}}, 0x78) 06:42:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imasig'}, {@hash='ha\\h'}]}) [ 844.483382][ T5573] Dev loop5: unable to read RDB block 9 [ 844.489240][ T5573] loop5: AHDI p1 p2 p4 [ 844.569202][ T5573] loop5: partition table partially beyond EOD, truncated [ 844.579679][ T5573] loop5: p1 start 1362130174 is beyond EOD, truncated [ 844.603858][ T5573] loop5: p2 start 1256873442 is beyond EOD, truncated 06:42:47 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:42:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:47 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000}}}, 0x78) 06:42:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(0x0, &(0x7f00000005c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) 06:42:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(0x0, &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 844.766710][ T5608] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value [ 844.926333][ T5619] Dev loop5: unable to read RDB block 9 [ 844.954640][ T5619] loop5: AHDI p1 p2 p4 06:42:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(0x0, &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imasig'}, {@hash='hach'}]}) [ 844.972394][ T5619] loop5: partition table partially beyond EOD, truncated 06:42:47 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(0x0, &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 845.037260][ T5619] loop5: p1 start 1362130174 is beyond EOD, truncated 06:42:47 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}}}, 0x78) [ 845.122358][ T5619] loop5: p2 start 1256873442 is beyond EOD, truncated 06:42:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 845.325672][ T5619] Dev loop5: unable to read RDB block 9 [ 845.388264][ T5619] loop5: AHDI p1 p2 p4 [ 845.393202][ T5619] loop5: partition table partially beyond EOD, truncated [ 845.407771][ T5619] loop5: p1 start 1362130174 is beyond EOD, truncated [ 845.422290][ T5619] loop5: p2 start 1256873442 is beyond EOD, truncated 06:42:48 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:42:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', 0x0, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:48 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x0, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:48 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x57000000}}}, 0x78) 06:42:48 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x57000000}}}, 0x78) [ 845.510330][ T5647] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value 06:42:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', 0x0, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:48 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0, 0x5}, &(0x7f0000000300)) 06:42:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imasig'}, {@hash='hadh'}]}) 06:42:48 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdaffffff}}}, 0x78) 06:42:48 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0xffffffffffffff5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7bf, 0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000380)='/dev/sequencer2\x00', 0x4000, 0x0) sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000580)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1470002}, 0xc, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="3c010040", @ANYRES16=0x0, @ANYBLOB="000126bd7000fedbdf250e000000080006000000000014000200080003000000000008000e804e2000006c0003000800010004000000080001000000000008000800ff00000008000100000000000800080045000000080001000000000008000300010000001400020076657468310000000000000000000000140002006772653000000000000000000000000008000496cedde25b949dd09d00040000003800030014000200767863616e3100000000000000000000080004000100000008000800000000000800030003000000080001000000000008000600ff0700005800020008000d00010000000800060001000100080005000100000014000100ff02000000000000000000000000000108000e004e23000008000e004e200000080002004e22000008000edd4d2200000800040004000000080006000200000065cdfcbe8aac1e08e47ce47ea394d3b96cc3c8f29802100a4c6309ed20997c505555bc85d0ac86995932a4150437a6b9288fce6e73ba914c8bc0907472d57dcf2e798c3c75bd0fe0479d4c1c259d08152c659e3f230b"], 0x13c}, 0x1, 0x0, 0x0, 0x883d21a065c7e299}, 0x20000100) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000080), 0x8) io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xe3aa5b0dbf4a42da, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39298b181ee6b9ddc4ac339deb1c445184fa8a83f5248e5cba5cc63fffa39f613906dc3de7198344042386f8fa7bcc2aa0c50dd42e11e8a75dacf96442cfc354d3ca7421bfbb3718d359d48fd5dca1f25314548f19145eb4c9b1aeee545fe253038fe8542fa643e737bef86dc664f031c0f95215fee95b8a9074a383c4f750f82e90cb2d0dd272b6a4f204ce3ee9f48af63a1b5bafaed8eef06528b64d304db2a0bda15e7fb6164e4e7fa27c37d4e16bc2", 0xec, 0x2, 0x0, 0x5, r0}, &(0x7f0000000300)) [ 845.749501][ T5668] Dev loop5: unable to read RDB block 9 06:42:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', 0x0, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 845.813496][ T5668] loop5: AHDI p1 p2 p4 [ 845.817743][ T5668] loop5: partition table partially beyond EOD, truncated 06:42:48 executing program 0: io_setup(0x0, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xe3aa5b0dbf4a42da, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39298b181ee6b9ddc4ac339deb1c445184fa8a83f5248e5cba5cc63fffa39f613906dc3de7198344042386f8fa7bcc2aa0c50dd42e11e8a75dacf96442cfc354d3ca7421bfbb3718d359d48fd5dca1f25314548f19145eb4c9b1aeee545fe253038fe8542fa643e737bef86dc664f031c0f95215fee95b8a9074a383c4f750f82e90cb2d0dd272b6a4f204ce3ee9f48af63a1b5bafaed8eef06528b64d304db2a0bda15e7fb6164e4e7fa27c37d4e16bc2", 0xec, 0x2, 0x0, 0x5}, &(0x7f0000000300)) [ 845.994265][ T5682] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value [ 846.012620][ T5668] loop5: p1 start 1362130174 is beyond EOD, truncated [ 846.019554][ T5668] loop5: p2 start 1256873442 is beyond EOD, truncated [ 846.179100][ T5668] Dev loop5: unable to read RDB block 9 [ 846.199897][ T5668] loop5: AHDI p1 p2 p4 [ 846.204760][ T5668] loop5: partition table partially beyond EOD, truncated [ 846.214962][ T5668] loop5: p1 start 1362130174 is beyond EOD, truncated [ 846.221892][ T5668] loop5: p2 start 1256873442 is beyond EOD, truncated 06:42:49 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:42:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imasig'}, {@hash='haih'}]}) 06:42:49 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0xffffffffffffff5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7bf, 0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000380)='/dev/sequencer2\x00', 0x4000, 0x0) sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000580)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1470002}, 0xc, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="3c010040", @ANYRES16=0x0, @ANYBLOB="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"], 0x13c}, 0x1, 0x0, 0x0, 0x883d21a065c7e299}, 0x20000100) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000080), 0x8) io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xe3aa5b0dbf4a42da, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39298b181ee6b9ddc4ac339deb1c445184fa8a83f5248e5cba5cc63fffa39f613906dc3de7198344042386f8fa7bcc2aa0c50dd42e11e8a75dacf96442cfc354d3ca7421bfbb3718d359d48fd5dca1f25314548f19145eb4c9b1aeee545fe253038fe8542fa643e737bef86dc664f031c0f95215fee95b8a9074a383c4f750f82e90cb2d0dd272b6a4f204ce3ee9f48af63a1b5bafaed8eef06528b64d304db2a0bda15e7fb6164e4e7fa27c37d4e16bc2", 0xec, 0x2, 0x0, 0x5, r0}, &(0x7f0000000300)) 06:42:49 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0xffffffffffffff5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7bf, 0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000380)='/dev/sequencer2\x00', 0x4000, 0x0) io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xe3aa5b0dbf4a42da, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39298b181ee6b9ddc4ac339deb1c445184fa8a83f5248e5cba5cc63fffa39f613906dc3de7198344042386f8fa7bcc2aa0c50dd42e11e8a75dacf96442cfc354d3ca7421bfbb3718d359d48fd5dca1f25314548f19145eb4c9b1aeee545fe253038fe8542fa643e737bef86dc664f031c0f95215fee95b8a9074a383c4f750f82e90cb2d0dd272b6a4f204ce3ee9f48af63a1b5bafaed8eef06528b64d304db2a0bda15e7fb6164e4e7fa27c37d4e16bc2", 0xec, 0x2, 0x0, 0x5, r0}, &(0x7f0000000300)) 06:42:49 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffda}}}, 0x78) 06:42:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:49 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78}, 0x78) 06:42:49 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 846.489977][ T5715] Dev loop5: unable to read RDB block 9 [ 846.532728][ T5715] loop5: AHDI p1 p2 p4 [ 846.542968][ T5715] loop5: partition table partially beyond EOD, truncated 06:42:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:49 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0xffffffffffffff5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7bf, 0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000380)='/dev/sequencer2\x00', 0x4000, 0x0) sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000580)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1470002}, 0xc, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="3c010040", @ANYRES16=0x0, @ANYBLOB="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"], 0x13c}, 0x1, 0x0, 0x0, 0x883d21a065c7e299}, 0x20000100) io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xe3aa5b0dbf4a42da, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39298b181ee6b9ddc4ac339deb1c445184fa8a83f5248e5cba5cc63fffa39f613906dc3de7198344042386f8fa7bcc2aa0c50dd42e11e8a75dacf96442cfc354d3ca7421bfbb3718d359d48fd5dca1f25314548f19145eb4c9b1aeee545fe253038fe8542fa643e737bef86dc664f031c0f95215fee95b8a9074a383c4f750f82e90cb2d0dd272b6a4f204ce3ee9f48af63a1b5bafaed8eef06528b64d304db2a0bda15e7fb6164e4e7fa27c37d4e16bc2", 0xec, 0x2, 0x0, 0x5, r0}, &(0x7f0000000300)) 06:42:49 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}}, 0x78) [ 846.626137][ T5715] loop5: p1 start 1362130174 is beyond EOD, truncated [ 846.692321][ T5715] loop5: p2 start 1256873442 is beyond EOD, truncated [ 846.866974][ T5708] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value [ 846.883608][ T5715] Dev loop5: unable to read RDB block 9 [ 846.909189][ T5715] loop5: AHDI p1 p2 p4 [ 846.914443][ T5715] loop5: partition table partially beyond EOD, truncated [ 846.921685][ T5715] loop5: p1 start 1362130174 is beyond EOD, truncated [ 846.932031][ T5715] loop5: p2 start 1256873442 is beyond EOD, truncated 06:42:49 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="ae02e0285451423020bf4bb1f233a32d034ce718517fcc6feba8e13da3f25b822c0caedef77480025ed03931ee0b25e16c7076dc2df2a83a792218e2b0b46859f6298e099db7873db886a5c2ec0af2826d2a73e5d79e78a2715eec7f36ebcb312e87f7daeb6e6ecce7f88fbeb7f8890e11d6b35f2e49df09ca6eebc2f0835a280ad84abbc9b3ed31e1438048ff5afe722d3ed3a1af7a6c3e7f07f4a4de58443e264fc6d7335bd326c747772daea7f42d3931f7c59a4749d5e442256b10b60b27f3275ff8c981b2a4af2c283fb1f40cde0ba30ee1fc087f1171c45758df7897fa1b2ac8495490210035d99bf4909d8c905b0260dbac903596c5c7839b193cf57c796bd3b69490f7bd0adfebdb296ecfa3cc994d1e7b76d5b694b00bb8d679376928697520adbcef9b513fcc92f216420ea95f9fc5e71fd22a982563cf9b4cec57ac66cc420d94c88569f5a715292bd8450735cff08fd4f684400190df78a309c02f3fefe507231903f56f4f2fccbd37fb5d54441029b822f4ceccc68adadfdd458ec5c89d2982343c0cd23039db490f92a3541b049763d04c66c08bca633fb681f0a757506766488271f7d3d8375ce360c3bc1ff3820b62875ad7521b34dce16e3ec439ad7219f0513074fe296b1cfa7fd5d05f4aea5de26fa70bd4e6c0934c0a11af974a066df40f61434a", 0x1eb, 0x3}]) 06:42:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900), 0x0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:49 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}}, 0x78) 06:42:49 executing program 0: perf_event_open(&(0x7f0000000000)={0x1, 0xffffffffffffff5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7bf, 0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000380)='/dev/sequencer2\x00', 0x4000, 0x0) sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000580)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1470002}, 0xc, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="3c010040", @ANYRES16=0x0, @ANYBLOB="000126bd7000fedbdf250e000000080006000000000014000200080003000000000008000e804e2000006c0003000800010004000000080001000000000008000800ff00000008000100000000000800080045000000080001000000000008000300010000001400020076657468310000000000000000000000140002006772653000000000000000000000000008000496cedde25b949dd09d00040000003800030014000200767863616e3100000000000000000000080004000100000008000800000000000800030003000000080001000000000008000600ff0700005800020008000d00010000000800060001000100080005000100000014000100ff02000000000000000000000000000108000e004e23000008000e004e200000080002004e22000008000edd4d2200000800040004000000080006000200000065cdfcbe8aac1e08e47ce47ea394d3b96cc3c8f29802100a4c6309ed20997c505555bc85d0ac86995932a4150437a6b9288fce6e73ba914c8bc0907472d57dcf2e798c3c75bd0fe0479d4c1c259d08152c659e3f230b"], 0x13c}, 0x1, 0x0, 0x0, 0x883d21a065c7e299}, 0x20000100) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) socket$inet6_sctp(0xa, 0x5, 0x84) io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xe3aa5b0dbf4a42da, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39298b181ee6b9ddc4ac339deb1c445184fa8a83f5248e5cba5cc63fffa39f613906dc3de7198344042386f8fa7bcc2aa0c50dd42e11e8a75dacf96442cfc354d3ca7421bfbb3718d359d48fd5dca1f25314548f19145eb4c9b1aeee545fe253038fe8542fa643e737bef86dc664f031c0f95215fee95b8a9074a383c4f750f82e90cb2d0dd272b6a4f204ce3ee9f48af63a1b5bafaed8eef06528b64d304db2a0bda15e7fb6164e4e7fa27c37d4e16bc2", 0xec, 0x2, 0x0, 0x5, r0}, &(0x7f0000000300)) 06:42:49 executing program 1: perf_event_open(&(0x7f0000000000)={0x1, 0xffffffffffffff5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7bf, 0xfffffffffffffffd}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000380)='/dev/sequencer2\x00', 0x4000, 0x0) sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f0000000580)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1470002}, 0xc, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="3c010040", @ANYRES16=0x0, @ANYBLOB="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"], 0x13c}, 0x1, 0x0, 0x0, 0x883d21a065c7e299}, 0x20000100) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x8, &(0x7f0000000080), 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xe3aa5b0dbf4a42da, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39298b181ee6b9ddc4ac339deb1c445184fa8a83f5248e5cba5cc63fffa39f613906dc3de7198344042386f8fa7bcc2aa0c50dd42e11e8a75dacf96442cfc354d3ca7421bfbb3718d359d48fd5dca1f25314548f19145eb4c9b1aeee545fe253038fe8542fa643e737bef86dc664f031c0f95215fee95b8a9074a383c4f750f82e90cb2d0dd272b6a4f204ce3ee9f48af63a1b5bafaed8eef06528b64d304db2a0bda15e7fb6164e4e7fa27c37d4e16bc2", 0xec, 0x2, 0x0, 0x5, r0}, &(0x7f0000000300)) 06:42:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imasig'}, {@hash='halh'}]}) 06:42:49 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}}, 0x78) 06:42:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900), 0x0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'+mackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imasig'}, {@hash='hash'}]}) 06:42:50 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'%mackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imasig'}, {@hash='hash'}]}) [ 847.326896][ T5759] Dev loop5: unable to read RDB block 9 [ 847.405708][ T5759] loop5: AHDI p1 p2 p4 06:42:50 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}}}, 0x78) [ 847.448619][ T5759] loop5: partition table partially beyond EOD, truncated [ 847.469811][ T5759] loop5: p1 start 1362130174 is beyond EOD, truncated [ 847.483277][ T5755] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value [ 847.550074][ T5759] loop5: p2 start 1256873442 is beyond EOD, truncated 06:42:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900), 0x0, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 847.796625][ T5776] FAT-fs (loop0): Unrecognized mount option "fowner<00000000000000000000" or missing value [ 847.798152][ T5767] FAT-fs (loop1): Unrecognized mount option "fowner<00000000000000000000" or missing value 06:42:50 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:42:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imasig'}, {@hash='haoh'}]}) 06:42:50 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd}}}, 0x78) 06:42:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5", 0x60, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}, 0x3c}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imasig'}, {@hash='hash'}]}) 06:42:50 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24}}}, 0x78) 06:42:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5", 0x60, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 848.160037][ T5790] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value 06:42:51 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner-'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imasig'}, {@hash='hash'}]}) [ 848.213367][ T5801] Dev loop5: unable to read RDB block 9 [ 848.241517][ T5801] loop5: AHDI p1 p2 p4 [ 848.298595][ T5801] loop5: partition table partially beyond EOD, truncated [ 848.334525][ T5801] loop5: p1 start 1362130174 is beyond EOD, truncated 06:42:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imasig'}, {@hash='haph'}]}) [ 848.376804][ T5801] loop5: p2 start 1256873442 is beyond EOD, truncated 06:42:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5", 0x60, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:51 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x57}}}, 0x78) [ 848.527256][ T5807] FAT-fs (loop1): Unrecognized mount option "fowner<000000000000000000000x0}) r8 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) fsetxattr$system_posix_acl(r8, &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000900)=ANY=[@ANYBLOB="020000000100eb0000000000020001", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\b\x00\x00', @ANYBLOB='\b\x00\x00', @ANYRES32, @ANYBLOB="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", @ANYBLOB], 0x8, 0x1) r9 = socket(0xa, 0x3, 0x8) r10 = syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x9c4, 0x70000) ioctl$sock_inet_SIOCSIFFLAGS(r9, 0x89a2, &(0x7f0000000180)={'bridge0\x00\x00\x01\x00', 0x4}) write$RDMA_USER_CM_CMD_CREATE_ID(r10, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}}}, 0x20) sendmsg$key(r9, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[], 0x1de}}, 0x0) r12 = gettid() waitid(0x83b895581628fca4, r12, &(0x7f0000000040), 0x2, &(0x7f0000000480)) sendmsg$key(r9, &(0x7f00000006c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000540)=ANY=[@ANYPTR64=&(0x7f0000000640)=ANY=[@ANYRES64, @ANYRESHEX=r11, @ANYRESDEC=r12]], 0xfffffffffffffe56}}, 0x20004850) r13 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r14 = syz_open_dev$sndseq(&(0x7f0000000700)='/dev/snd/seq\x00', 0x0, 0x0) r15 = dup2(r14, r13) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r15, 0xc08c5332, &(0x7f0000000140)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00'}) r16 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r16) r17 = syz_open_dev$sg(&(0x7f0000001580)='/dev/sg#\x00', 0x0, 0x5) writev(r17, &(0x7f0000000000)=[{&(0x7f0000000100)="ae88bff8240000005a90f57f07703aeff0f64ebbee07962c22772e11b44e69d90cf41bdd2ac8bb8c43b460e46292", 0x2e}, {&(0x7f0000000180)="53000000c90dca807737f408177021bd01d3be55090000000001a0000000000000000000", 0x29c}], 0x2) ioctl$SG_GET_REQUEST_TABLE(r17, 0x227d, &(0x7f0000000780)) kcmp(r16, r12, 0x0, 0xffffffffffffffff, r17) ptrace$setopts(0x4206, r16, 0x0, 0x0) r18 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x5, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0xc0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x4, 0x0, 0x0, 0x2}, &(0x7f0000000580), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={r16, r18, 0x0, 0xc, &(0x7f0000000180)='/dev/amidi#\x00', r19}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000018c0)={r12, r15, 0x0, 0xd, &(0x7f0000001880)='bond_slave_0\x00', r19}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r19}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000100)={r19}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000023c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000002380)='\x00', r19}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x17, &(0x7f0000000780)='cgroup.subtree_control\x00', r19}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r19}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r7, r8, 0x0, 0x1, &(0x7f0000000080)='\x00', r19}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r5, 0x0, 0x4, &(0x7f0000000180)='em1\x00', r19}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r19}, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={r1, r4, 0x0, 0x5, &(0x7f00000000c0)='syz1\x00', r19}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000000)='bdevmd5sum@selinuxuser\x0e-em0lo{-em0&:%buser', r19}, 0x30) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={r19}, 0xc) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080)={r19}, 0xc) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001480)={0xffffffffffffffff, 0xc0, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)=0x3, 0x0, 0x0, 0x0, &(0x7f00000012c0)={0x3, 0x4}, 0x0, 0x0, &(0x7f0000001300)={0x1, 0x8, 0x6, 0x4}, &(0x7f0000001340)=0x150cda5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001380)=0x4}}, 0x10) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000001500)={r20}, 0xbca4e49be564cf27) r21 = socket$isdn(0x22, 0x3, 0x21) r22 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r22, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r22, 0x401c5820, &(0x7f0000000180)=0x18) r23 = accept(r22, &(0x7f0000001140)=@rc, &(0x7f00000011c0)=0x80) setsockopt$inet_sctp6_SCTP_EVENTS(r23, 0x84, 0xb, &(0x7f0000001200)={0x0, 0x1f, 0x81, 0x8, 0x7f, 0x2, 0x4, 0x1, 0x0, 0x2, 0x5}, 0xb) getsockopt$sock_buf(r21, 0x1, 0x1c, &(0x7f0000000040)=""/4096, &(0x7f0000001040)=0x1000) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000000)=0x200ca, 0x4) [ 849.882749][ T5853] loop5: partition table partially beyond EOD, truncated [ 849.936119][ T5867] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value [ 849.963939][ T5853] loop5: p1 start 1362130174 is beyond EOD, truncated [ 849.985641][ T5853] loop5: p2 start 1256873442 is beyond EOD, truncated 06:42:52 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:42:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000", 0xa8, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imasig'}, {@hash='haxh'}]}) 06:42:52 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2400}}}, 0x78) [ 850.078282][ T5873] FAT-fs (loop0): Unrecognized mount option "fowner00000000000000000000" or missing value 06:42:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000", 0xa8, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:53 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00}}}, 0x78) 06:42:53 executing program 0: perf_event_open(&(0x7f0000000600)={0x1, 0x43b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x15, &(0x7f0000000080), 0x8) [ 850.405456][ T5904] Dev loop5: unable to read RDB block 9 [ 850.411094][ T5904] loop5: AHDI p1 p2 p4 [ 850.443487][ T5904] loop5: partition table partially beyond EOD, truncated 06:42:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000", 0xb4, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 850.450892][ T5904] loop5: p1 start 1362130174 is beyond EOD, truncated [ 850.462799][ T5904] loop5: p2 start 1256873442 is beyond EOD, truncated 06:42:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000", 0xa8, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:53 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 06:42:53 executing program 0: perf_event_open(&(0x7f0000000600)={0x1, 0x43b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x14, &(0x7f0000000080), 0x8) [ 850.594526][ T5904] Dev loop5: unable to read RDB block 9 [ 850.600158][ T5904] loop5: AHDI p1 p2 p4 [ 850.617300][ T5900] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value [ 850.673209][ T5904] loop5: partition table partially beyond EOD, truncated [ 850.680732][ T5904] loop5: p1 start 1362130174 is beyond EOD, truncated [ 850.701705][ T5904] loop5: p2 start 1256873442 is beyond EOD, truncated 06:42:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner\x17'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imasig'}, {@hash='hash'}]}) 06:42:53 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:42:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000", 0xb4, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:53 executing program 0: perf_event_open(&(0x7f0000000600)={0x1, 0x43b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0xb, &(0x7f0000000080), 0x8) 06:42:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imasig'}, {@hash='hash', 0x7}]}) 06:42:53 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5700}}}, 0x78) 06:42:53 executing program 0 (fault-call:2 fault-nth:0): io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) [ 851.022320][ T5940] Dev loop5: unable to read RDB block 9 [ 851.055785][ T5940] loop5: AHDI p1 p2 p4 [ 851.082436][ T5940] loop5: partition table partially beyond EOD, truncated 06:42:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000", 0xb4, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 851.223176][ T5940] loop5: p1 start 1362130174 is beyond EOD, truncated [ 851.230212][ T5940] loop5: p2 start 1256873442 is beyond EOD, truncated [ 851.255651][ T5933] FAT-fs (loop1): Unrecognized mount option "fowner00000000000000000000" or missing value 06:42:54 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 06:42:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000"/186, 0xba, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:54 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}}}, 0x78) [ 851.427052][ T5951] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value 06:42:54 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 06:42:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000", 0xb4, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 851.707216][ T5940] Dev loop5: unable to read RDB block 9 [ 851.723086][ T5940] loop5: AHDI p1 p2 p4 [ 851.732324][ T5940] loop5: partition table partially beyond EOD, truncated [ 851.748629][ T5940] loop5: p1 start 1362130174 is beyond EOD, truncated [ 851.762490][ T5940] loop5: p2 start 1256873442 is beyond EOD, truncated 06:42:54 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:42:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imasig'}, {@hash='hash', 0x3c}]}) 06:42:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000"/186, 0xba, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:54 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x4, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 06:42:54 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}}}, 0x78) 06:42:54 executing program 1 (fault-call:2 fault-nth:0): io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) 06:42:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000"/186, 0xba, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000"/189, 0xbd, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:54 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}}}, 0x78) 06:42:55 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}}}, 0x78) [ 852.207944][ T6004] Dev loop5: unable to read RDB block 9 [ 852.262974][ T6004] loop5: AHDI p1 p2 p4 06:42:55 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0xf, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 06:42:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000"/189, 0xbd, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 852.285362][ T5983] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value [ 852.305683][ T6004] loop5: partition table partially beyond EOD, truncated [ 852.324607][ T6004] loop5: p1 start 1362130174 is beyond EOD, truncated [ 852.338425][ T6004] loop5: p2 start 1256873442 is beyond EOD, truncated 06:42:55 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:42:55 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000}}}, 0x78) 06:42:55 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) 06:42:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imasig'}, {@hash='hash'}]}) [ 852.503352][ T6004] Dev loop5: unable to read RDB block 9 [ 852.509098][ T6004] loop5: AHDI p1 p2 p4 [ 852.515450][ T6004] loop5: partition table partially beyond EOD, truncated [ 852.523585][ T6004] loop5: p1 start 1362130174 is beyond EOD, truncated [ 852.530720][ T6004] loop5: p2 start 1256873442 is beyond EOD, truncated 06:42:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000"/189, 0xbd, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:55 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000}}}, 0x78) 06:42:55 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x2, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) 06:42:55 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x21, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 06:42:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e", 0xbf, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:55 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000}}}, 0x78) [ 852.847085][ T6040] Dev loop5: unable to read RDB block 9 [ 852.847598][ T6029] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value [ 852.877816][ T6040] loop5: AHDI p1 p2 p4 06:42:55 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000}}}, 0x78) [ 852.931173][ T6040] loop5: partition table partially beyond EOD, truncated 06:42:55 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0xf00, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) [ 852.976615][ T6040] loop5: p1 start 1362130174 is beyond EOD, truncated [ 853.054966][ T6040] loop5: p2 start 1256873442 is beyond EOD, truncated 06:42:55 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="ae02e0285451423020bf4bb1f233a32d034ce718517fcc6feba8e13da3f25b822c0caedef77480025ed03931ee0b25e16c7076dc14f2a83d792218e2b0b46859f6298e099db7873db886a5c2ec0af2826d2a73e5d79e78a2715eec7f36ebcb312e87f7daeb6e6ecce7f88fbeb7f8890e11d6b35f2e49df09ca6eebc2f0835a280ad84abbc9b3ed31e1438048ff5afe722d3ed3a1af7a6c3e7f07f4a4de58443e264fc6d7335bd326c747772daea7f42d3931f7c59a4749d5e442256b10b60b27f3275ff8c981b2a4af2c283fb1f40cde0ba30ee1fc087f1171c45758df7897fa1b2ac8495490210035d99bf4909d8c905b0260dbac903596c5c7839b193cf57c796bd3b69490f7bd0adfebdb296ecfa3cc994d1e7b76d5b694b00bb8d679376928697520adbcef9b513fcc92f216420ea95f9fc5e71fd22a982563cf9b4cec57ac66cc420d94c88569f5a715292bd8450735cff08fd4f684400190df78a309c02f3fefe507231903f56f4f2fccbd37fb5d54441029b822f4ceccc68adadfdd458ec5c89d2982343c0cd23039db490f92a3541b049763d04c66c08bca633fb681f0a757506766488271f7d3d8375ce360c3bc1ff3820b62875ad7521b34dce16e3ec439ad7219f0513074fe296b1cfa7fd5d05f4aea5de26fa70bd4e6c0934c0a11af974a066df40f61434a", 0x1eb, 0x3}]) 06:42:55 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x4, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) 06:42:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e", 0xbf, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imasig'}, {@hash='hash'}], 0x2}) 06:42:56 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}}}, 0x78) 06:42:56 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x2100, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 06:42:56 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0xf, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) 06:42:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e", 0xbf, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:56 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x57000000}}}, 0x78) [ 853.455174][ T6079] loop5: [POWERTEC] p1 p2 p3 p4 p5 p6 p7 p8 p9 p10 p11 p12 [ 853.531301][ T6079] loop5: p1 start 540033617 is beyond EOD, truncated [ 853.539301][ T6079] loop5: p2 start 4158565900 is beyond EOD, truncated [ 853.546907][ T6079] loop5: p3 start 4133054644 is beyond EOD, truncated [ 853.554250][ T6079] loop5: p4 start 914353246 is beyond EOD, truncated [ 853.561077][ T6079] loop5: p5 start 3389644617 is beyond EOD, truncated [ 853.568394][ T6079] loop5: p6 start 2946618174 is beyond EOD, truncated 06:42:56 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x21, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) [ 853.575836][ T6079] loop5: p7 start 959313063 is beyond EOD, truncated [ 853.583144][ T6079] loop5: p8 start 2973706284 is beyond EOD, truncated [ 853.590041][ T6079] loop5: p9 start 889201040 is beyond EOD, truncated [ 853.608863][ T6079] loop5: p10 start 2495009643 is beyond EOD, truncated [ 853.657069][ T6079] loop5: p11 start 677984121 is beyond EOD, truncated 06:42:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, 0x0) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r0, r1}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:56 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x3f00, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) [ 853.728603][ T6079] loop5: p12 start 2614059813 is beyond EOD, truncated 06:42:56 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="ae02e0285451423020bf4bb1f233a32d034ce718517fcc6feba8e13da3f25b822c0caedef77480025ed03931ee0b25e16c7076dc14f2a84b792218e2b0b46859f6298e099db7873db886a5c2ec0af2826d2a73e5d79e78a2715eec7f36ebcb312e87f7daeb6e6ecce7f88fbeb7f8890e11d6b35f2e49df09ca6eebc2f0835a280ad84abbc9b3ed31e1438048ff5afe722d3ed3a1af7a6c3e7f07f4a4de58443e264fc6d7335bd326c747772daea7f42d3931f7c59a4749d5e442256b10b60b27f3275ff8c981b2a4af2c283fb1f40cde0ba30ee1fc087f1171c45758df7897fa1b2ac8495490210035d99bf4909d8c905b0260dbac903596c5c7839b193cf57c796bd3b69490f7bd0adfebdb296ecfa3cc994d1e7b76d5b694b00bb8d679376928697520adbcef9b513fcc92f216420ea95f9fc5e71fd22a982563cf9b4cec57ac66cc420d94c88569f5a715292bd8450735cff08fd4f684400190df78a309c02f3fefe507231903f56f4f2fccbd37fb5d54441029b822f4ceccc68adadfdd458ec5c89d2982343c0cd23039db490f92a3541b049763d04c66c08bca633fb681f0a757506766488271f7d3d8375ce360c3bc1ff3820b62875ad7521b34dce16e3ec439ad7219f0513074fe296b1cfa7fd5d05f4aea5de26fa70bd4e6c0934c0a11af974a066df40f61434a", 0x1eb, 0x3}]) 06:42:56 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdaffffff}}}, 0x78) 06:42:56 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0xf00, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) [ 853.978772][ T6087] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value 06:42:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imasig'}, {@hash='hash'}], 0x3}) 06:42:56 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x2000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 06:42:56 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffda}}}, 0x78) 06:42:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, 0x0) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r0, r1}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 854.162908][ T6124] Dev loop5: unable to read RDB block 9 06:42:57 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x2100, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) [ 854.233994][ T6124] loop5: AHDI p1 p2 p4 [ 854.251726][ T6124] loop5: partition table partially beyond EOD, truncated 06:42:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0xc0, 0x0) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, r0, r1}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:57 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78}, 0x78) [ 854.312554][ T6124] loop5: p1 start 1362130174 is beyond EOD, truncated 06:42:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(0x0, &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 854.378534][ T6124] loop5: p2 start 1256873442 is beyond EOD, truncated 06:42:57 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x4000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) [ 854.457965][ T6136] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value [ 854.579035][ T6124] Dev loop5: unable to read RDB block 9 [ 854.584937][ T6124] loop5: AHDI p1 p2 p4 [ 854.589299][ T6124] loop5: partition table partially beyond EOD, truncated [ 854.597029][ T6124] loop5: p1 start 1362130174 is beyond EOD, truncated [ 854.604079][ T6124] loop5: p2 start 1256873442 is beyond EOD, truncated 06:42:57 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:42:57 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}}, 0x78) 06:42:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(0x0, &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:57 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x3f00, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) 06:42:57 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0xf000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 06:42:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imasig'}, {@hash='hash'}], 0x4}) 06:42:57 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}}, 0x78) 06:42:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(0x0, &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:57 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x2000000, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) 06:42:57 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x21000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) [ 854.993896][ T6184] Dev loop5: unable to read RDB block 9 06:42:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', 0x0, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 855.074471][ T6184] loop5: AHDI p1 p2 p4 06:42:57 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x4000000, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) [ 855.096072][ T6182] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value [ 855.119226][ T6184] loop5: partition table partially beyond EOD, truncated [ 855.207084][ T6184] loop5: p1 start 1362130174 is beyond EOD, truncated [ 855.237870][ T6184] loop5: p2 start 1256873442 is beyond EOD, truncated [ 855.390505][ T6184] Dev loop5: unable to read RDB block 9 [ 855.399827][ T6184] loop5: AHDI p1 p2 p4 [ 855.405041][ T6184] loop5: partition table partially beyond EOD, truncated [ 855.416267][ T6184] loop5: p1 start 1362130174 is beyond EOD, truncated [ 855.431101][ T6184] loop5: p2 start 1256873442 is beyond EOD, truncated 06:42:58 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:42:58 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x3f000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 06:42:58 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}}, 0x78) 06:42:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', 0x0, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:58 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0xf000000, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) 06:42:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imasig'}, {@hash='hash'}], 0x5}) 06:42:58 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}}}, 0x78) 06:42:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', 0x0, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:58 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x21000000, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) 06:42:58 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) [ 855.704400][ T6230] Dev loop5: unable to read RDB block 9 [ 855.738167][ T6230] loop5: AHDI p1 p2 p4 [ 855.765779][ T6220] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value [ 855.780735][ T6230] loop5: partition table partially beyond EOD, truncated [ 855.789078][ T6230] loop5: p1 start 1362130174 is beyond EOD, truncated [ 855.796109][ T6230] loop5: p2 start 1256873442 is beyond EOD, truncated 06:42:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imasig'}, {@hash='hash'}], 0x6}) 06:42:58 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd}}}, 0x78) [ 855.985170][ T6230] Dev loop5: unable to read RDB block 9 [ 855.992448][ T6230] loop5: AHDI p1 p2 p4 [ 855.996652][ T6230] loop5: partition table partially beyond EOD, truncated [ 856.115256][ T6230] loop5: p1 start 1362130174 is beyond EOD, truncated [ 856.137997][ T6255] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value [ 856.154480][ T6230] loop5: p2 start 1256873442 is beyond EOD, truncated 06:42:59 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:42:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:59 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24}}}, 0x78) 06:42:59 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 06:42:59 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x3f000000, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) 06:42:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imasig'}, {@hash='hash'}], 0x7}) 06:42:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:59 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x57}}}, 0x78) 06:42:59 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0xf00000000000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) [ 856.429885][ T6275] Dev loop5: unable to read RDB block 9 [ 856.457055][ T6275] loop5: AHDI p1 p2 p4 [ 856.492754][ T6275] loop5: partition table partially beyond EOD, truncated 06:42:59 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900}}}, 0x78) 06:42:59 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x200000000000000, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) [ 856.539580][ T6275] loop5: p1 start 1362130174 is beyond EOD, truncated [ 856.610909][ T6275] loop5: p2 start 1256873442 is beyond EOD, truncated 06:42:59 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x2100000000000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) [ 856.728049][ T6279] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value [ 856.861324][ T6275] Dev loop5: unable to read RDB block 9 [ 856.890055][ T6275] loop5: AHDI p1 p2 p4 [ 856.896811][ T6275] loop5: partition table partially beyond EOD, truncated [ 856.910496][ T6275] loop5: p1 start 1362130174 is beyond EOD, truncated [ 856.923681][ T6275] loop5: p2 start 1256873442 is beyond EOD, truncated 06:42:59 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:42:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:42:59 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00}}}, 0x78) 06:42:59 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x400000000000000, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) 06:42:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imasig'}, {@hash='hash'}], 0x8}) 06:42:59 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x3f00000000000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 06:42:59 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2400}}}, 0x78) 06:42:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:00 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x8000000000000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 06:43:00 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0xf00000000000000, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) [ 857.262706][ T6328] Dev loop5: unable to read RDB block 9 [ 857.281521][ T6321] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value 06:43:00 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00}}}, 0x78) [ 857.341507][ T6328] loop5: AHDI p1 p2 p4 [ 857.347104][ T6328] loop5: partition table partially beyond EOD, truncated [ 857.355883][ T6328] loop5: p1 start 1362130174 is beyond EOD, truncated 06:43:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imasig'}, {@hash='hash'}], 0x10}) [ 857.472314][ T6328] loop5: p2 start 1256873442 is beyond EOD, truncated [ 857.684258][ T6328] Dev loop5: unable to read RDB block 9 [ 857.689902][ T6328] loop5: AHDI p1 p2 p4 [ 857.726668][ T6351] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value [ 857.758691][ T6328] loop5: partition table partially beyond EOD, truncated [ 857.766480][ T6328] loop5: p1 start 1362130174 is beyond EOD, truncated [ 857.773799][ T6328] loop5: p2 start 1256873442 is beyond EOD, truncated 06:43:00 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:43:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:00 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 06:43:00 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x2100000000000000, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) 06:43:00 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 06:43:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[{@iocharset={'iocharset', 0x3d, 'cp950'}}, {@shortname_mixed='d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff'}, {@rodir='rodir'}]}) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x0, 0x0) dup2(r0, r1) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x6, 0x100) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r2) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r4, 0x401c5820, &(0x7f0000000180)=0x18) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r4, 0xc0305602, &(0x7f0000000040)={0x0, 0x80000000, 0x3036, 0x1}) write$cgroup_int(r3, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r3, 0x401c5820, &(0x7f0000000180)=0x18) recvfrom$packet(r3, &(0x7f0000000100)=""/243, 0xf3, 0x40000000, 0x0, 0x0) 06:43:00 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5700}}}, 0x78) 06:43:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:00 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) [ 858.063210][ T6378] Dev loop5: unable to read RDB block 9 [ 858.077146][ T6378] loop5: AHDI p1 p2 p4 06:43:00 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x3f00000000000000, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) 06:43:01 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}}}, 0x78) [ 858.189103][ T6378] loop5: partition table partially beyond EOD, truncated 06:43:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 858.281634][ T6378] loop5: p1 start 1362130174 is beyond EOD, truncated [ 858.311567][ T6375] FAT-fs (loop3): Unrecognized mount option "d" or missing value [ 858.319808][ T6378] loop5: p2 start 1256873442 is beyond EOD, truncated 06:43:01 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="ae02e0285451423020bf4bb1f233a32d034ce718517fcc6feba8e13da3f25b822c0caedef77480025ed03931ee0b25e16c7076dc14f2a83a794b18e2b0b46859f6298e099db7873db886a5c2ec0af2826d2a73e5d79e78a2715eec7f36ebcb312e87f7daeb6e6ecce7f88fbeb7f8890e11d6b35f2e49df09ca6eebc2f0835a280ad84abbc9b3ed31e1438048ff5afe722d3ed3a1af7a6c3e7f07f4a4de58443e264fc6d7335bd326c747772daea7f42d3931f7c59a4749d5e442256b10b60b27f3275ff8c981b2a4af2c283fb1f40cde0ba30ee1fc087f1171c45758df7897fa1b2ac8495490210035d99bf4909d8c905b0260dbac903596c5c7839b193cf57c796bd3b69490f7bd0adfebdb296ecfa3cc994d1e7b76d5b694b00bb8d679376928697520adbcef9b513fcc92f216420ea95f9fc5e71fd22a982563cf9b4cec57ac66cc420d94c88569f5a715292bd8450735cff08fd4f684400190df78a309c02f3fefe507231903f56f4f2fccbd37fb5d54441029b822f4ceccc68adadfdd458ec5c89d2982343c0cd23039db490f92a3541b049763d04c66c08bca633fb681f0a757506766488271f7d3d8375ce360c3bc1ff3820b62875ad7521b34dce16e3ec439ad7219f0513074fe296b1cfa7fd5d05f4aea5de26fa70bd4e6c0934c0a11af974a066df40f61434a", 0x1eb, 0x3}]) 06:43:01 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x8000000000000000, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) 06:43:01 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x4, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 06:43:01 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}}}, 0x78) 06:43:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 858.734403][ T6419] Dev loop5: unable to read RDB block 9 [ 858.782755][ T6419] loop5: AHDI p1 p2 p4 [ 858.786973][ T6419] loop5: partition table partially beyond EOD, truncated [ 858.864068][ T6375] FAT-fs (loop3): Unrecognized mount option "d" or missing value 06:43:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imasig'}, {@hash='hash'}]}) syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x200, 0x10d040) 06:43:01 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) 06:43:01 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}}}, 0x78) 06:43:01 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0xf, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 06:43:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 858.940342][ T6419] loop5: p1 start 1362130174 is beyond EOD, truncated [ 858.962747][ T6419] loop5: p2 start 1256873442 is beyond EOD, truncated 06:43:01 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}}}, 0x78) 06:43:01 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x21, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) [ 859.144598][ T6419] Dev loop5: unable to read RDB block 9 [ 859.168130][ T6419] loop5: AHDI p1 p2 p4 06:43:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={0x0, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:02 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) 06:43:02 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) [ 859.218196][ T6419] loop5: partition table partially beyond EOD, truncated [ 859.232743][ T6419] loop5: p1 start 1362130174 is beyond EOD, truncated [ 859.240869][ T6419] loop5: p2 start 1256873442 is beyond EOD, truncated 06:43:02 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0xf00, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 06:43:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={0x0, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 859.613917][ T6468] Dev loop5: unable to read RDB block 9 [ 859.647837][ T6468] loop5: AHDI p1 p2 p4 [ 859.652059][ T6468] loop5: partition table partially beyond EOD, truncated [ 859.665134][ T6468] loop5: p1 start 1362130174 is beyond EOD, truncated [ 859.722498][ T6468] loop5: p2 start 1256873442 is beyond EOD, truncated [ 859.836134][ T6468] Dev loop5: unable to read RDB block 9 [ 859.851611][ T6468] loop5: AHDI p1 p2 p4 [ 859.856590][ T6468] loop5: partition table partially beyond EOD, truncated [ 859.864483][ T6468] loop5: p1 start 1362130174 is beyond EOD, truncated [ 859.871410][ T6468] loop5: p2 start 1256873442 is beyond EOD, truncated [ 859.905753][ T6474] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value 06:43:02 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, &(0x7f0000000180)=0x18) setsockopt$TIPC_IMPORTANCE(r0, 0x10f, 0x7f, &(0x7f0000000000), 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imasig'}, {@hash='hash'}]}) 06:43:02 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000}}}, 0x78) 06:43:02 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x2100, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 06:43:02 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x4, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) 06:43:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={0x0, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:02 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:43:02 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000}}}, 0x78) 06:43:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, 0x0, r1}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:03 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000}}}, 0x78) 06:43:03 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0xf, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) 06:43:03 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x3f00, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) [ 860.207413][ T6500] Dev loop5: unable to read RDB block 9 [ 860.308083][ T6500] loop5: AHDI p1 p2 p4 06:43:03 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000}}}, 0x78) [ 860.333222][ T6500] loop5: partition table partially beyond EOD, truncated [ 860.351645][ T6500] loop5: p1 start 1362130174 is beyond EOD, truncated [ 860.372033][ T6500] loop5: p2 start 1256873442 is beyond EOD, truncated [ 860.737790][ T6519] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value 06:43:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0xfc, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="666f776edb84005a2965c5fd65723c", @ANYRESDEC=0x0, @ANYBLOB="2c736d61636b66736861743de676626f786e657431402c61707072616973655f747970653d696d617369672c686173682c00"]) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, &(0x7f0000000180)=0x18) ioctl$KVM_SET_IRQCHIP(r0, 0x8208ae63, &(0x7f0000000080)={0x7, 0x0, @ioapic={0x5000, 0x8001, 0xb45a, 0x2, 0x0, [{0x20, 0x7, 0x0, [], 0x7f}, {0xfd, 0x20, 0x2}, {0x5, 0x1, 0x9, [], 0xe0}, {0x76, 0x3, 0x2, [], 0x8}, {0x9, 0x7, 0x5, [], 0x1}, {0x80, 0x81, 0x0, [], 0x4}, {0x51, 0x0, 0x9, [], 0x5}, {0x20, 0x6, 0xfd, [], 0xc1}, {0xc1, 0x0, 0x7, [], 0xff}, {0x81, 0x3f, 0x2, [], 0x3f}, {0x40, 0xff, 0x9b}, {0x8, 0x9, 0x4c, [], 0x40}, {0x0, 0x6, 0x80, [], 0x7}, {0xa8, 0x18, 0x3, [], 0x4}, {0x0, 0x1, 0x4, [], 0x5}, {0x1f, 0x7f, 0x9, [], 0x4}, {0x53, 0x0, 0x80, [], 0x8}, {0x90, 0x2, 0x0, [], 0x9}, {0xfd, 0x4, 0x2, [], 0x4}, {0x7, 0xc8, 0x81}, {0xcd, 0x2, 0x4}, {0x7f, 0x8, 0x0, [], 0x74}, {0x4, 0x7b, 0x5, [], 0x11}, {0xa1, 0x81, 0x80, [], 0x1}]}}) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000001c0)='tls\x00', 0x4) ioctl$KVM_GET_LAPIC(0xffffffffffffffff, 0x8400ae8e, &(0x7f0000000340)={"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"}) 06:43:03 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x2000000, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 06:43:03 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x21, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) 06:43:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, 0x0, r1}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:03 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="ae02e0285451423020bf4bb1f233a32d034ce718517fcc6feba8e13da3f25b822c0caedef77480025ed03931ee0b25e16c7076dc14f2a83a79222fe2b0b46859f6298e099db7873db886a5c2ec0af2826d2a73e5d79e78a2715eec7f36ebcb312e87f7daeb6e6ecce7f88fbeb7f8890e11d6b35f2e49df09ca6eebc2f0835a280ad84abbc9b3ed31e1438048ff5afe722d3ed3a1af7a6c3e7f07f4a4de58443e264fc6d7335bd326c747772daea7f42d3931f7c59a4749d5e442256b10b60b27f3275ff8c981b2a4af2c283fb1f40cde0ba30ee1fc087f1171c45758df7897fa1b2ac8495490210035d99bf4909d8c905b0260dbac903596c5c7839b193cf57c796bd3b69490f7bd0adfebdb296ecfa3cc994d1e7b76d5b694b00bb8d679376928697520adbcef9b513fcc92f216420ea95f9fc5e71fd22a982563cf9b4cec57ac66cc420d94c88569f5a715292bd8450735cff08fd4f684400190df78a309c02f3fefe507231903f56f4f2fccbd37fb5d54441029b822f4ceccc68adadfdd458ec5c89d2982343c0cd23039db490f92a3541b049763d04c66c08bca633fb681f0a757506766488271f7d3d8375ce360c3bc1ff3820b62875ad7521b34dce16e3ec439ad7219f0513074fe296b1cfa7fd5d05f4aea5de26fa70bd4e6c0934c0a11af974a066df40f61434a", 0x1eb, 0x3}]) 06:43:03 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}}}, 0x78) 06:43:04 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x4000000, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 06:43:04 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x57000000}}}, 0x78) [ 861.234027][ T6554] Dev loop5: unable to read RDB block 9 [ 861.239870][ T6554] loop5: AHDI p1 p2 p4 06:43:04 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdaffffff}}}, 0x78) 06:43:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r1 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r1, 0x0, r1}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 861.302485][ T6554] loop5: partition table partially beyond EOD, truncated 06:43:04 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0xf00, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) [ 861.363034][ T6554] loop5: p1 start 1362130174 is beyond EOD, truncated 06:43:04 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffda}}}, 0x78) [ 861.410394][ T6554] loop5: p2 start 1256873442 is beyond EOD, truncated [ 861.554259][ T6554] Dev loop5: unable to read RDB block 9 [ 861.560064][ T6554] loop5: AHDI p1 p2 p4 [ 861.578918][ T6554] loop5: partition table partially beyond EOD, truncated [ 861.642619][ T6554] loop5: p1 start 1362130174 is beyond EOD, truncated [ 861.657915][ T6554] loop5: p2 start 1256873442 is beyond EOD, truncated [ 861.872754][ T6587] FAT-fs (loop3): Unrecognized mount option "cpuacct.usage_percpu_sys" or missing value 06:43:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c736d61636b66736861743de676626f786e657431402c61707072616973655f747970653d696d617369672c686173682c0010"]) 06:43:04 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0xf000000, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 06:43:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:04 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x2100, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) 06:43:04 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78}, 0x78) 06:43:04 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:43:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:05 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}}, 0x78) [ 862.316440][ T6608] Dev loop5: unable to read RDB block 9 [ 862.322086][ T6608] loop5: AHDI p1 p2 p4 [ 862.342275][ T6608] loop5: partition table partially beyond EOD, truncated 06:43:05 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}}, 0x78) 06:43:05 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x3f00, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) [ 862.364975][ T6608] loop5: p1 start 1362130174 is beyond EOD, truncated 06:43:05 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x21000000, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) [ 862.412310][ T6608] loop5: p2 start 1256873442 is beyond EOD, truncated 06:43:05 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}}, 0x78) [ 862.565581][ T6608] Dev loop5: unable to read RDB block 9 [ 862.613577][ T6608] loop5: AHDI p1 p2 p4 [ 862.633545][ T6608] loop5: partition table partially beyond EOD, truncated [ 862.677514][ T6608] loop5: p1 start 1362130174 is beyond EOD, truncated [ 862.771499][ T6608] loop5: p2 start 1256873442 is beyond EOD, truncated [ 862.893605][ T6643] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value 06:43:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x639, 0x3, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa23a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imasig'}, {@hash='hash'}]}) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x15d4b87) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x0, 0x0) dup2(r1, r2) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x7f, 0xfd, 0x4, 0xff, 0x0, 0x2, 0x1010, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x80000001, 0x7, @perf_config_ext={0x8001}, 0x10000, 0x8, 0x4, 0x9, 0xb64, 0x81, 0x3}, 0xffffffffffffffff, 0x0, r1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, &(0x7f0000000180)=0x18) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000200)='vfat\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x810100}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0xfc, r3, 0x800, 0x70bd27, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x8c, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x98}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x34f}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}]}, @TIPC_NLA_NET={0x10, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x100000001}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x200}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3ff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x80000001}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x81}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7fff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1f}]}]}, 0xfc}, 0x1, 0x0, 0x0, 0x8011}, 0x40) 06:43:05 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x2000000, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) 06:43:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:05 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}}}, 0x78) 06:43:05 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x3f000000, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 06:43:05 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:43:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 863.162764][ T6658] Dev loop5: unable to read RDB block 9 06:43:06 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x4000000, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) 06:43:06 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd}}}, 0x78) 06:43:06 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) [ 863.248699][ T6670] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value [ 863.258895][ T6658] loop5: AHDI p1 p2 p4 [ 863.258907][ T6658] loop5: partition table partially beyond EOD, truncated [ 863.271039][ T6658] loop5: p1 start 1362130174 is beyond EOD, truncated [ 863.284657][ T6658] loop5: p2 start 1256873442 is beyond EOD, truncated 06:43:06 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24}}}, 0x78) 06:43:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 863.506291][ T6658] Dev loop5: unable to read RDB block 9 [ 863.512031][ T6658] loop5: AHDI p1 p2 p4 [ 863.534111][ T6658] loop5: partition table partially beyond EOD, truncated [ 863.541549][ T6658] loop5: p1 start 1362130174 is beyond EOD, truncated [ 863.549105][ T6658] loop5: p2 start 1256873442 is beyond EOD, truncated 06:43:06 executing program 3: syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB='fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c736d61636b66736861743de676626f786e657431402c61707072616973655f747970653d696d6173696728686173682c00"]) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, &(0x7f0000000180)=0x18) getsockopt$netlink(r0, 0x10e, 0x4, &(0x7f0000000000)=""/222, &(0x7f0000000100)=0xde) syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x1ff, 0xe0000) 06:43:06 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x2, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 06:43:06 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x57}}}, 0x78) 06:43:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, 0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:06 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0xf000000, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) 06:43:06 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:43:06 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900}}}, 0x78) 06:43:06 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x21000000, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) 06:43:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, 0x0) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:06 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) [ 863.895126][ T6712] Dev loop5: unable to read RDB block 9 [ 863.924365][ T6715] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value 06:43:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, 0x0) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 864.013498][ T6712] loop5: AHDI p1 p2 p4 06:43:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, 0x0) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 864.060284][ T6712] loop5: partition table partially beyond EOD, truncated [ 864.139246][ T6712] loop5: p1 start 1362130174 is beyond EOD, truncated [ 864.157796][ T6712] loop5: p2 start 1256873442 is beyond EOD, truncated [ 864.326733][ T6712] Dev loop5: unable to read RDB block 9 [ 864.351105][ T6712] loop5: AHDI p1 p2 p4 [ 864.360074][ T6712] loop5: partition table partially beyond EOD, truncated [ 864.371347][ T6712] loop5: p1 start 1362130174 is beyond EOD, truncated [ 864.382723][ T6712] loop5: p2 start 1256873442 is beyond EOD, truncated [ 864.675178][ T6715] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value 06:43:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imasig'}, {@hash='hash'}]}) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x15d4b87) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x0, 0x0) dup2(r1, r2) r3 = socket$tipc(0x1e, 0x5, 0x0) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x0, 0x0) dup2(r4, r5) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x0, 0x0) dup2(r6, r7) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000001c0)=[r2, r0, r3, r0, r5, r7], 0x6) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, &(0x7f0000000180)=0x18) r8 = accept4(r0, &(0x7f0000000000)=@generic, &(0x7f0000000080)=0x80, 0x80400) setsockopt$CAIFSO_REQ_PARAM(r8, 0x116, 0x80, &(0x7f00000000c0)="2f152d984cd4fea78a79dc0c8a40263a80f39ffd0ea3ed1a81a30107b9343148b0dcbbfda4568a060ff066597d3889c51b5ba6f7fb2d4e4b9bc014b505fda49053c73a586fb8eb001f64cb9476bf76d0d14029f3c324a97d14aff3266155c0e5de26ad86b78ff6aaf9b6ff661e7dcd93a697e2053c515fe52825ea9aa634ad3eb73120f975231f3e56a5fdf38d07430574e01fd8267e5d145732d8598c1f85e3ade96efb809683bbdb742047da388a4e8ca962ec163f34cdc1d728666a8571f0d11063335f75bbdd6169993c", 0xcc) 06:43:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={0x0, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:07 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00}}}, 0x78) 06:43:07 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x3f000000, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) 06:43:07 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0xf, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 06:43:07 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:43:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={0x0, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:07 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2400}}}, 0x78) [ 864.948890][ T6761] Dev loop5: unable to read RDB block 9 06:43:07 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) [ 864.989590][ T6761] loop5: AHDI p1 p2 p4 06:43:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={0x0, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 865.042677][ T6761] loop5: partition table partially beyond EOD, truncated 06:43:07 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x21, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) [ 865.131908][ T6761] loop5: p1 start 1362130174 is beyond EOD, truncated 06:43:08 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x2, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) [ 865.184035][ T6761] loop5: p2 start 1256873442 is beyond EOD, truncated [ 865.333790][ T6761] Dev loop5: unable to read RDB block 9 [ 865.339889][ T6761] loop5: AHDI p1 p2 p4 [ 865.352763][ T6761] loop5: partition table partially beyond EOD, truncated [ 865.360058][ T6761] loop5: p1 start 1362130174 is beyond EOD, truncated [ 865.406294][ T6761] loop5: p2 start 1256873442 is beyond EOD, truncated [ 865.613115][ T6795] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value 06:43:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imasig'}, {@hash='hash'}]}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) sched_rr_get_interval(r0, &(0x7f0000000040)) 06:43:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:09 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:43:09 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0xf00, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 06:43:09 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00}}}, 0x78) 06:43:09 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x4, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) [ 866.509825][ T6832] Dev loop5: unable to read RDB block 9 [ 866.516872][ T6832] loop5: AHDI p1 p2 p4 [ 866.525900][ T6832] loop5: partition table partially beyond EOD, truncated 06:43:09 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0xf, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) 06:43:09 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 06:43:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 866.552580][ T6832] loop5: p1 start 1362130174 is beyond EOD, truncated [ 866.566099][ T6832] loop5: p2 start 1256873442 is beyond EOD, truncated 06:43:09 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x2100, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 06:43:09 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x21, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) [ 866.767689][ T6832] Dev loop5: unable to read RDB block 9 [ 866.802649][ T6832] loop5: AHDI p1 p2 p4 [ 866.807031][ T6832] loop5: partition table partially beyond EOD, truncated 06:43:09 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5700}}}, 0x78) [ 866.833786][ T6832] loop5: p1 start 1362130174 is beyond EOD, truncated [ 866.853526][ T6832] loop5: p2 start 1256873442 is beyond EOD, truncated [ 867.195425][ T6861] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value 06:43:10 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:43:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:10 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0xf00, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) 06:43:10 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x3f00, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 06:43:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x0, 0x0) dup2(r0, r1) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ff9000/0x1000)=nil, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000080)="dee8b719716486effae0b68017d3d52c06395a62b3723210b7891b6660cc7e81406c29064f6d2fc5270640a7b30bf3a29eee390d800293be40acb02bf8c2918ff61aa5c7f038a83a7248f07a1668177190644e9c4864eef72bc7223c82593d9918b1050676e263b5ff1616bffcde0f79635938f7717eb9c20533bf8e983225807885b39101c46d7ab86c49e768764247684a8f14b7af21855e9a8b86346fd5f30a9a1043b57c9b040bb841517574133ff4e5ff4fd6614980320b5039578ca7ae19bd73e9a275fccf3c04475f4183a7e6", 0xd0, r0}, 0x68) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imasig'}, {@dont_hash='dont_hash'}]}) 06:43:10 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}}}, 0x78) 06:43:10 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}}}, 0x78) [ 867.393342][ T6884] Dev loop5: unable to read RDB block 9 [ 867.400288][ T6884] loop5: AHDI p1 p2 p4 [ 867.409209][ T6884] loop5: partition table partially beyond EOD, truncated 06:43:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:10 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x2100, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) 06:43:10 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x2000000, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) [ 867.457120][ T6884] loop5: p1 start 1362130174 is beyond EOD, truncated [ 867.458507][ T6887] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value [ 867.489092][ T6884] loop5: p2 start 1256873442 is beyond EOD, truncated 06:43:10 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}}}, 0x78) 06:43:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r3, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r3, 0x401c5820, &(0x7f0000000180)=0x18) ioctl$KVM_SET_PIT(r3, 0x8048ae66, &(0x7f00000000c0)={[{0xab, 0x101, 0xe7, 0x8, 0x7f, 0x7, 0xfd, 0x9, 0x81, 0xec, 0x6, 0x6, 0x6}, {0x4, 0x7ff, 0x1, 0x0, 0x9, 0x4, 0x9, 0x3, 0x6c, 0x1, 0x44, 0x3, 0x80000001}, {0x0, 0x8, 0x81, 0x3f, 0x1, 0xe4, 0x3, 0x0, 0xba, 0x1, 0x3f, 0x0, 0xf7a}], 0x7}) setuid(r2) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00I\x00\x00', @ANYRESDEC=0x0, @ANYBLOB=',euid<', @ANYRESDEC=r2, @ANYBLOB=',appraise_type=imasig,euid>', @ANYRESDEC=r0, @ANYBLOB="2cb8"]) [ 867.703734][ T6884] Dev loop5: unable to read RDB block 9 [ 867.712428][ T6884] loop5: AHDI p1 p2 p4 [ 867.750904][ T6884] loop5: partition table partially beyond EOD, truncated [ 867.819913][ T6884] loop5: p1 start 1362130174 is beyond EOD, truncated [ 867.874761][ T6884] loop5: p2 start 1256873442 is beyond EOD, truncated 06:43:10 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:43:10 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x3f00, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) 06:43:10 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x4000000, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 06:43:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c736d61636b667368615b58743de616e9d9a262626f786e657431402c61707072616973655f747970653d696d61f379672c68617368"]) 06:43:10 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}}}, 0x78) 06:43:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:10 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0xf000000, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 06:43:10 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000}}}, 0x78) 06:43:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:10 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x2000000, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) [ 868.216084][ T6939] Dev loop5: unable to read RDB block 9 [ 868.239401][ T6939] loop5: AHDI p1 p2 p4 [ 868.260892][ T6939] loop5: partition table partially beyond EOD, truncated [ 868.292660][ T6939] loop5: p1 start 1362130174 is beyond EOD, truncated [ 868.292703][ T6923] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value [ 868.341320][ T6939] loop5: p2 start 1256873442 is beyond EOD, truncated 06:43:11 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x4000000, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) 06:43:11 executing program 2: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x2000000, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) [ 868.582803][ T6939] Dev loop5: unable to read RDB block 9 [ 868.588446][ T6939] loop5: AHDI p1 p2 p4 [ 868.623004][ T6939] loop5: partition table partially beyond EOD, truncated [ 868.652386][ T6939] loop5: p1 start 1362130174 is beyond EOD, truncated [ 868.659238][ T6939] loop5: p2 start 1256873442 is beyond EOD, truncated 06:43:11 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:43:11 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000}}}, 0x78) 06:43:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f0000000000)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, ')\x16\xf8g\x91$\x0e\xdb\xe8'}}, {@appraise_type='appraise_type=imasig'}, {@hash='hash'}]}) 06:43:11 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x21000000, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 06:43:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:11 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0xf000000, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) 06:43:11 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000}}}, 0x78) 06:43:11 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x3f000000, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) [ 868.928886][ T6981] Dev loop5: unable to read RDB block 9 [ 868.940351][ T6981] loop5: AHDI p1 p2 p4 [ 868.976849][ T6981] loop5: partition table partially beyond EOD, truncated 06:43:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0xf3, 0x0) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:11 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000}}}, 0x78) [ 869.062566][ T6981] loop5: p1 start 1362130174 is beyond EOD, truncated [ 869.071155][ T6981] loop5: p2 start 1256873442 is beyond EOD, truncated 06:43:11 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}}}, 0x78) 06:43:11 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x21000000, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) [ 869.198979][ T6976] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value [ 869.257755][ T6981] Dev loop5: unable to read RDB block 9 [ 869.278901][ T6981] loop5: AHDI p1 p2 p4 [ 869.292899][ T6981] loop5: partition table partially beyond EOD, truncated [ 869.300404][ T6981] loop5: p1 start 1362130174 is beyond EOD, truncated [ 869.316645][ T6981] loop5: p2 start 1256873442 is beyond EOD, truncated 06:43:12 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:43:12 executing program 2: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x21000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 06:43:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imasig'}, {@hash='hash'}]}) 06:43:12 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 06:43:12 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x3f000000, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) 06:43:12 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x57000000}}}, 0x78) 06:43:12 executing program 2 (fault-call:5 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 869.563606][ T7026] Dev loop5: unable to read RDB block 9 [ 869.572623][ T7026] loop5: AHDI p1 p2 p4 06:43:12 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 06:43:12 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdaffffff}}}, 0x78) 06:43:12 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) [ 869.615260][ T7026] loop5: partition table partially beyond EOD, truncated 06:43:12 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffda}}}, 0x78) [ 869.686190][ T7026] loop5: p1 start 1362130174 is beyond EOD, truncated [ 869.717259][ T7026] loop5: p2 start 1256873442 is beyond EOD, truncated [ 869.837720][ T7043] FAULT_INJECTION: forcing a failure. [ 869.837720][ T7043] name failslab, interval 1, probability 0, space 0, times 0 [ 869.860004][ T7043] CPU: 1 PID: 7043 Comm: syz-executor.2 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 869.870032][ T7043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 869.880102][ T7043] Call Trace: [ 869.883413][ T7043] dump_stack+0x197/0x210 [ 869.887786][ T7043] should_fail.cold+0xa/0x15 [ 869.892403][ T7043] ? fault_create_debugfs_attr+0x180/0x180 [ 869.899033][ T7043] ? ___might_sleep+0x163/0x2c0 [ 869.903908][ T7043] __should_failslab+0x121/0x190 [ 869.908866][ T7043] should_failslab+0x9/0x14 [ 869.913389][ T7043] __kmalloc_track_caller+0x2dc/0x760 [ 869.918921][ T7043] ? strndup_user+0x77/0xd0 [ 869.923437][ T7043] memdup_user+0x26/0xd0 [ 869.927699][ T7043] strndup_user+0x77/0xd0 [ 869.932143][ T7043] __keyctl_dh_compute+0x1d0/0x1470 06:43:12 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) [ 869.937436][ T7043] ? mark_lock+0xc2/0x1220 [ 869.941845][ T7043] ? retint_kernel+0x2b/0x2b [ 869.946446][ T7043] ? __kasan_check_read+0x11/0x20 [ 869.951499][ T7043] ? dh_data_from_key+0x2b0/0x2b0 [ 869.956561][ T7043] ? find_held_lock+0x35/0x130 [ 869.961334][ T7043] ? __might_fault+0x12b/0x1e0 [ 869.966115][ T7043] ? find_held_lock+0x35/0x130 [ 869.970977][ T7043] ? __might_fault+0x12b/0x1e0 [ 869.975783][ T7043] ? lock_downgrade+0x920/0x920 [ 869.980663][ T7043] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 869.987272][ T7043] ? _copy_from_user+0x12c/0x1a0 [ 869.992327][ T7043] keyctl_dh_compute+0xcf/0x12d [ 869.997214][ T7043] ? __keyctl_dh_compute+0x1470/0x1470 [ 870.002670][ T7043] ? fput+0x1b/0x20 [ 870.006500][ T7043] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 870.011950][ T7043] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 870.017414][ T7043] ? do_syscall_64+0x26/0x790 [ 870.022088][ T7043] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 870.028136][ T7043] ? do_syscall_64+0x26/0x790 [ 870.032835][ T7043] __x64_sys_keyctl+0x159/0x470 [ 870.037686][ T7043] do_syscall_64+0xfa/0x790 [ 870.042188][ T7043] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 870.048072][ T7043] RIP: 0033:0x45a639 [ 870.051957][ T7043] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 870.073040][ T7043] RSP: 002b:00007f23a6a90c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 870.081452][ T7043] RAX: ffffffffffffffda RBX: 00007f23a6a90c90 RCX: 000000000045a639 [ 870.089415][ T7043] RDX: 0000000020000700 RSI: 0000000020000000 RDI: 0000000000000017 [ 870.097396][ T7043] RBP: 000000000075bf20 R08: 0000000020000040 R09: 0000000000000000 [ 870.105369][ T7043] R10: 0000000000000356 R11: 0000000000000246 R12: 00007f23a6a916d4 [ 870.113345][ T7043] R13: 00000000004c6d7c R14: 00000000004dc240 R15: 0000000000000004 [ 870.174226][ T7037] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value [ 870.258511][ T7026] Dev loop5: unable to read RDB block 9 [ 870.264353][ T7026] loop5: AHDI p1 p2 p4 [ 870.268650][ T7026] loop5: partition table partially beyond EOD, truncated [ 870.276121][ T7026] loop5: p1 start 1362130174 is beyond EOD, truncated [ 870.283111][ T7026] loop5: p2 start 1256873442 is beyond EOD, truncated 06:43:13 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:43:13 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78}, 0x78) 06:43:13 executing program 2 (fault-call:5 fault-nth:1): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:13 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x4, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 06:43:13 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x4, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) 06:43:13 executing program 3: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x185300, 0x0) ioctl$VIDIOC_CROPCAP(r0, 0xc02c563a, &(0x7f0000000040)={0x1, {0x4, 0x81, 0x7d}, {0xfffffffd, 0x8001, 0x1, 0x3}, {0x2, 0x80000001}}) ioctl$IMGETDEVINFO(0xffffffffffffffff, 0x80044944, &(0x7f0000000080)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 06:43:13 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}}, 0x78) 06:43:13 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xf, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) 06:43:13 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xf, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 06:43:13 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}}, 0x78) [ 870.628118][ T7083] Dev loop5: unable to read RDB block 9 [ 870.649676][ T7083] loop5: AHDI p1 p2 p4 [ 870.658777][ T7083] loop5: partition table partially beyond EOD, truncated 06:43:13 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}}, 0x78) [ 870.679784][ T7083] loop5: p1 start 1362130174 is beyond EOD, truncated [ 870.694922][ T7083] loop5: p2 start 1256873442 is beyond EOD, truncated [ 870.732019][ T7078] FAULT_INJECTION: forcing a failure. [ 870.732019][ T7078] name failslab, interval 1, probability 0, space 0, times 0 [ 870.760253][ T7078] CPU: 1 PID: 7078 Comm: syz-executor.2 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 870.770113][ T7078] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 06:43:13 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x21, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) [ 870.780526][ T7078] Call Trace: [ 870.783837][ T7078] dump_stack+0x197/0x210 [ 870.788217][ T7078] should_fail.cold+0xa/0x15 [ 870.788237][ T7078] ? fault_create_debugfs_attr+0x180/0x180 [ 870.788258][ T7078] ? ___might_sleep+0x163/0x2c0 [ 870.803491][ T7078] __should_failslab+0x121/0x190 [ 870.808457][ T7078] should_failslab+0x9/0x14 [ 870.812975][ T7078] __kmalloc+0x2e0/0x770 [ 870.817395][ T7078] ? crypto_alg_extsize+0xf/0x80 [ 870.822369][ T7078] ? __sanitizer_cov_trace_pc+0x20/0x50 [ 870.827949][ T7078] ? crypto_create_tfm+0x82/0x300 [ 870.832993][ T7078] crypto_create_tfm+0x82/0x300 [ 870.837859][ T7078] ? crypto_alg_mod_lookup+0xff/0x550 [ 870.843331][ T7078] crypto_alloc_tfm+0x105/0x2e0 [ 870.848196][ T7078] crypto_alloc_shash+0x2d/0x40 [ 870.853055][ T7078] __keyctl_dh_compute+0x200/0x1470 [ 870.858259][ T7078] ? mark_lock+0xc2/0x1220 [ 870.862693][ T7078] ? __kasan_check_read+0x11/0x20 [ 870.867736][ T7078] ? dh_data_from_key+0x2b0/0x2b0 [ 870.872799][ T7078] ? find_held_lock+0x35/0x130 [ 870.877573][ T7078] ? __might_fault+0x12b/0x1e0 [ 870.882339][ T7078] ? find_held_lock+0x35/0x130 [ 870.887096][ T7078] ? __might_fault+0x12b/0x1e0 [ 870.891846][ T7078] ? lock_downgrade+0x920/0x920 [ 870.896692][ T7078] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 870.902916][ T7078] ? _copy_from_user+0x12c/0x1a0 [ 870.907841][ T7078] keyctl_dh_compute+0xcf/0x12d [ 870.912696][ T7078] ? __keyctl_dh_compute+0x1470/0x1470 [ 870.918237][ T7078] __x64_sys_keyctl+0x159/0x470 [ 870.923077][ T7078] do_syscall_64+0xfa/0x790 [ 870.927574][ T7078] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 870.933453][ T7078] RIP: 0033:0x45a639 [ 870.937348][ T7078] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 870.956956][ T7078] RSP: 002b:00007f23a6a90c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 870.965359][ T7078] RAX: ffffffffffffffda RBX: 00007f23a6a90c90 RCX: 000000000045a639 [ 870.973330][ T7078] RDX: 0000000020000700 RSI: 0000000020000000 RDI: 0000000000000017 [ 870.981307][ T7078] RBP: 000000000075bf20 R08: 0000000020000040 R09: 0000000000000000 [ 870.989294][ T7078] R10: 0000000000000356 R11: 0000000000000246 R12: 00007f23a6a916d4 [ 870.997265][ T7078] R13: 00000000004c6d7c R14: 00000000004dc240 R15: 0000000000000004 [ 871.013281][ T7078] could not allocate digest TFM handle poly1305-simd 06:43:13 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:43:13 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}}}, 0x78) 06:43:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000)='vf\x81t\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="66e5db22fa6fdf87826a00378a10776e65723c99614331b12e5fe4f4bdc4b2dfc26ca96f2e7d303376c2cf3e9af8bc931241b268b3128142a7e19a8d0793f8e28919bb1cea3a8a65369ad5e17b473cf6b4c93ed1b7e35179c042cbc510bd98588aed8c86568c474b708bca38bddc036c926050abb4efdb350ec0f0342f3807253e72521329c0e01c772a", @ANYRESDEC=0x0, @ANYBLOB="2c740000000000003c81003de676626f786e657431402c61707072616973655f747970653d696d617369672c686173682c00"]) 06:43:13 executing program 2 (fault-call:5 fault-nth:2): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:13 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x21, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 06:43:14 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd}}}, 0x78) 06:43:14 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xf00, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) 06:43:14 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24}}}, 0x78) 06:43:14 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0xf00, 0x0, 0xffffffffffffffff, 0x0}, 0x0) [ 871.347285][ T7120] Dev loop5: unable to read RDB block 9 [ 871.352392][ T7119] FAULT_INJECTION: forcing a failure. [ 871.352392][ T7119] name failslab, interval 1, probability 0, space 0, times 0 [ 871.353566][ T7120] loop5: AHDI p1 p2 p4 [ 871.392362][ T7120] loop5: partition table partially beyond EOD, truncated [ 871.447551][ T7119] CPU: 0 PID: 7119 Comm: syz-executor.2 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 871.457428][ T7119] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 871.467572][ T7119] Call Trace: [ 871.470906][ T7119] dump_stack+0x197/0x210 [ 871.475263][ T7119] should_fail.cold+0xa/0x15 [ 871.479883][ T7119] ? fault_create_debugfs_attr+0x180/0x180 [ 871.485906][ T7119] ? ___might_sleep+0x163/0x2c0 [ 871.490784][ T7119] __should_failslab+0x121/0x190 [ 871.495748][ T7119] should_failslab+0x9/0x14 [ 871.500263][ T7119] __kmalloc+0x2e0/0x770 [ 871.504513][ T7119] ? __keyctl_dh_compute+0x2be/0x1470 [ 871.509879][ T7119] __keyctl_dh_compute+0x2be/0x1470 [ 871.515064][ T7119] ? mark_lock+0xc2/0x1220 [ 871.519572][ T7119] ? get_pid_task+0xc9/0x180 [ 871.524181][ T7119] ? __kasan_check_read+0x11/0x20 [ 871.529235][ T7119] ? dh_data_from_key+0x2b0/0x2b0 [ 871.534283][ T7119] ? find_held_lock+0x35/0x130 [ 871.539057][ T7119] ? __might_fault+0x12b/0x1e0 [ 871.539077][ T7119] ? find_held_lock+0x35/0x130 [ 871.539092][ T7119] ? __might_fault+0x12b/0x1e0 [ 871.539115][ T7119] ? lock_downgrade+0x920/0x920 [ 871.539154][ T7119] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 871.548654][ T7119] ? _copy_from_user+0x12c/0x1a0 [ 871.548677][ T7119] keyctl_dh_compute+0xcf/0x12d [ 871.548695][ T7119] ? __keyctl_dh_compute+0x1470/0x1470 [ 871.548708][ T7119] ? fput+0x1b/0x20 [ 871.548729][ T7119] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 871.548748][ T7119] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 871.554943][ T7120] loop5: p1 start 1362130174 is beyond EOD, truncated [ 871.558361][ T7119] ? do_syscall_64+0x26/0x790 [ 871.558380][ T7119] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 871.558395][ T7119] ? do_syscall_64+0x26/0x790 [ 871.558416][ T7119] __x64_sys_keyctl+0x159/0x470 [ 871.558435][ T7119] do_syscall_64+0xfa/0x790 [ 871.558456][ T7119] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 871.565526][ T7120] loop5: p2 start 1256873442 is beyond EOD, truncated [ 871.569620][ T7119] RIP: 0033:0x45a639 06:43:14 executing program 2 (fault-call:5 fault-nth:3): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:14 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x57}}}, 0x78) [ 871.569637][ T7119] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 871.569646][ T7119] RSP: 002b:00007f23a6a90c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 871.569660][ T7119] RAX: ffffffffffffffda RBX: 00007f23a6a90c90 RCX: 000000000045a639 [ 871.569669][ T7119] RDX: 0000000020000700 RSI: 0000000020000000 RDI: 0000000000000017 [ 871.569678][ T7119] RBP: 000000000075bf20 R08: 0000000020000040 R09: 0000000000000000 [ 871.569687][ T7119] R10: 0000000000000356 R11: 0000000000000246 R12: 00007f23a6a916d4 [ 871.569696][ T7119] R13: 00000000004c6d7c R14: 00000000004dc240 R15: 0000000000000004 06:43:14 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2100, 0x0, 0xffffffffffffffff, 0x0}, 0x0) [ 871.930846][ T7120] Dev loop5: unable to read RDB block 9 [ 871.974368][ T7120] loop5: AHDI p1 p2 p4 [ 871.978608][ T7120] loop5: partition table partially beyond EOD, truncated [ 872.017935][ T7149] FAULT_INJECTION: forcing a failure. [ 872.017935][ T7149] name failslab, interval 1, probability 0, space 0, times 0 [ 872.018777][ T7120] loop5: p1 start 1362130174 is beyond EOD, truncated [ 872.041739][ T7149] CPU: 0 PID: 7149 Comm: syz-executor.2 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 872.051607][ T7149] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 872.052172][ T7120] loop5: p2 start 1256873442 is beyond EOD, truncated [ 872.061661][ T7149] Call Trace: [ 872.061702][ T7149] dump_stack+0x197/0x210 [ 872.061730][ T7149] should_fail.cold+0xa/0x15 [ 872.080750][ T7149] ? fault_create_debugfs_attr+0x180/0x180 [ 872.086556][ T7149] ? ___might_sleep+0x163/0x2c0 [ 872.086575][ T7149] __should_failslab+0x121/0x190 [ 872.086590][ T7149] should_failslab+0x9/0x14 [ 872.086608][ T7149] __kmalloc_track_caller+0x2dc/0x760 [ 872.106165][ T7149] ? down_read+0x109/0x430 [ 872.110566][ T7149] ? key_default_cmp+0x90/0x90 [ 872.115322][ T7149] ? down_read_killable+0x490/0x490 [ 872.120593][ T7149] ? dh_data_from_key+0x18c/0x2b0 [ 872.125703][ T7149] kmemdup+0x27/0x60 [ 872.129592][ T7149] dh_data_from_key+0x18c/0x2b0 [ 872.134436][ T7149] __keyctl_dh_compute+0x32c/0x1470 [ 872.139618][ T7149] ? mark_lock+0xc2/0x1220 [ 872.144020][ T7149] ? __kasan_check_read+0x11/0x20 [ 872.149055][ T7149] ? dh_data_from_key+0x2b0/0x2b0 [ 872.154060][ T7149] ? find_held_lock+0x35/0x130 [ 872.158813][ T7149] ? __might_fault+0x12b/0x1e0 [ 872.163559][ T7149] ? find_held_lock+0x35/0x130 [ 872.168310][ T7149] ? __might_fault+0x12b/0x1e0 [ 872.173148][ T7149] ? lock_downgrade+0x920/0x920 [ 872.177999][ T7149] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 872.184228][ T7149] ? _copy_from_user+0x12c/0x1a0 [ 872.189245][ T7149] keyctl_dh_compute+0xcf/0x12d [ 872.194086][ T7149] ? __keyctl_dh_compute+0x1470/0x1470 [ 872.199533][ T7149] ? __sanitizer_cov_trace_switch+0x13/0x80 [ 872.206016][ T7149] __x64_sys_keyctl+0x159/0x470 [ 872.210852][ T7149] do_syscall_64+0xfa/0x790 [ 872.215352][ T7149] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 872.221745][ T7149] RIP: 0033:0x45a639 [ 872.225624][ T7149] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 872.245220][ T7149] RSP: 002b:00007f23a6a90c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 872.253614][ T7149] RAX: ffffffffffffffda RBX: 00007f23a6a90c90 RCX: 000000000045a639 [ 872.261567][ T7149] RDX: 0000000020000700 RSI: 0000000020000000 RDI: 0000000000000017 [ 872.269523][ T7149] RBP: 000000000075bf20 R08: 0000000020000040 R09: 0000000000000000 [ 872.277488][ T7149] R10: 0000000000000356 R11: 0000000000000246 R12: 00007f23a6a916d4 [ 872.285441][ T7149] R13: 00000000004c6d7c R14: 00000000004dc240 R15: 0000000000000004 06:43:15 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:43:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x62, 0x0, 0x0, 0x2, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='uid<', @ANYRESDEC=r1, @ANYBLOB="2c646f6e745f61707072616973652c6f626b5f757365725384656c696e7578656d312b23656d312c686173601500"]) 06:43:15 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2100, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) 06:43:15 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900}}}, 0x78) 06:43:15 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3f00, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 06:43:15 executing program 2 (fault-call:5 fault-nth:4): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:15 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00}}}, 0x78) 06:43:15 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3f00, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) 06:43:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x8, &(0x7f0000000940)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, &(0x7f0000000180)=0x18) getsockopt$inet6_dccp_int(r0, 0x21, 0x5, &(0x7f0000000000), &(0x7f0000000040)=0x4) 06:43:15 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) [ 872.592749][ T7180] Dev loop5: unable to read RDB block 9 [ 872.648416][ T7180] loop5: AHDI p1 p2 p4 06:43:15 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2400}}}, 0x78) [ 872.730276][ T7187] FAT-fs (loop3): bogus number of reserved sectors [ 872.739112][ T7187] FAT-fs (loop3): Can't find a valid FAT filesystem [ 872.753633][ T7180] loop5: partition table partially beyond EOD, truncated [ 872.761090][ T7180] loop5: p1 start 1362130174 is beyond EOD, truncated [ 872.768479][ T7180] loop5: p2 start 1256873442 is beyond EOD, truncated [ 872.792740][ T7171] FAULT_INJECTION: forcing a failure. [ 872.792740][ T7171] name failslab, interval 1, probability 0, space 0, times 0 [ 872.815471][ T7171] CPU: 1 PID: 7171 Comm: syz-executor.2 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 872.825341][ T7171] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 872.835415][ T7171] Call Trace: [ 872.838727][ T7171] dump_stack+0x197/0x210 [ 872.843085][ T7171] should_fail.cold+0xa/0x15 [ 872.847991][ T7171] ? fault_create_debugfs_attr+0x180/0x180 [ 872.859375][ T7171] ? ___might_sleep+0x163/0x2c0 [ 872.864225][ T7171] __should_failslab+0x121/0x190 [ 872.869213][ T7171] should_failslab+0x9/0x14 [ 872.873742][ T7171] __kmalloc_track_caller+0x2dc/0x760 [ 872.879101][ T7171] ? down_read+0x109/0x430 [ 872.883510][ T7171] ? key_default_cmp+0x90/0x90 [ 872.888275][ T7171] ? down_read_killable+0x490/0x490 [ 872.893465][ T7171] ? dh_data_from_key+0x18c/0x2b0 [ 872.898485][ T7171] kmemdup+0x27/0x60 [ 872.902386][ T7171] dh_data_from_key+0x18c/0x2b0 [ 872.907425][ T7171] __keyctl_dh_compute+0x4c4/0x1470 [ 872.912616][ T7171] ? mark_lock+0xc2/0x1220 [ 872.917121][ T7171] ? __kasan_check_read+0x11/0x20 [ 872.922155][ T7171] ? dh_data_from_key+0x2b0/0x2b0 [ 872.927186][ T7171] ? __might_fault+0x12b/0x1e0 [ 872.931954][ T7171] ? find_held_lock+0x35/0x130 [ 872.936708][ T7171] ? __might_fault+0x12b/0x1e0 [ 872.941474][ T7171] ? lock_downgrade+0x920/0x920 [ 872.946591][ T7171] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 872.952831][ T7171] ? _copy_from_user+0x12c/0x1a0 [ 872.957771][ T7171] keyctl_dh_compute+0xcf/0x12d [ 872.962623][ T7171] ? __keyctl_dh_compute+0x1470/0x1470 [ 872.968414][ T7171] ? __sanitizer_cov_trace_switch+0x13/0x80 [ 872.974299][ T7171] __x64_sys_keyctl+0x159/0x470 [ 872.979154][ T7171] do_syscall_64+0xfa/0x790 [ 872.983656][ T7171] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 872.990605][ T7171] RIP: 0033:0x45a639 [ 872.994492][ T7171] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 873.014096][ T7171] RSP: 002b:00007f23a6a90c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 873.022494][ T7171] RAX: ffffffffffffffda RBX: 00007f23a6a90c90 RCX: 000000000045a639 [ 873.030482][ T7171] RDX: 0000000020000700 RSI: 0000000020000000 RDI: 0000000000000017 06:43:15 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0}, 0x0) [ 873.038462][ T7171] RBP: 000000000075bf20 R08: 0000000020000040 R09: 0000000000000000 [ 873.046441][ T7171] R10: 0000000000000356 R11: 0000000000000246 R12: 00007f23a6a916d4 [ 873.054415][ T7171] R13: 00000000004c6d7c R14: 00000000004dc240 R15: 0000000000000004 [ 873.203188][ T7180] Dev loop5: unable to read RDB block 9 [ 873.222360][ T7180] loop5: AHDI p1 p2 p4 [ 873.282835][ T7180] loop5: partition table partially beyond EOD, truncated [ 873.295964][ T7180] loop5: p1 start 1362130174 is beyond EOD, truncated [ 873.312051][ T7180] loop5: p2 start 1256873442 is beyond EOD, truncated 06:43:16 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:43:16 executing program 2 (fault-call:5 fault-nth:5): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:16 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x2, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) 06:43:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x4281, 0x0) write$P9_RSTAT(r0, &(0x7f0000000040)={0x5a, 0x7d, 0x2, {0x0, 0x56, 0xf173, 0x4546bd2a, {0x0, 0x0, 0x5}, 0x40040000, 0x1f, 0x2, 0x9, 0x4, '\'@M/', 0x4, 'hash', 0x11, 'dbdevwlan0wlan1/)', 0xa, 'smackfshat'}}, 0x5d) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB='fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c736d61636b66736861743de676626f786e657431402c61707072616973655f74797065672c686173682c00"]) 06:43:16 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00}}}, 0x78) 06:43:16 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0}, 0x0) 06:43:16 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}}, 0x78) 06:43:16 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0}, 0x0) 06:43:16 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x4, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) [ 873.609033][ T7231] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value 06:43:16 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5700}}}, 0x78) [ 873.697307][ T7225] FAULT_INJECTION: forcing a failure. [ 873.697307][ T7225] name failslab, interval 1, probability 0, space 0, times 0 [ 873.713266][ T7225] CPU: 1 PID: 7225 Comm: syz-executor.2 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 873.723115][ T7225] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 873.733181][ T7225] Call Trace: [ 873.736493][ T7225] dump_stack+0x197/0x210 [ 873.740832][ T7225] should_fail.cold+0xa/0x15 [ 873.745442][ T7225] ? fault_create_debugfs_attr+0x180/0x180 [ 873.751252][ T7225] ? ___might_sleep+0x163/0x2c0 [ 873.756104][ T7225] __should_failslab+0x121/0x190 [ 873.761057][ T7225] should_failslab+0x9/0x14 [ 873.765576][ T7225] __kmalloc_track_caller+0x2dc/0x760 [ 873.770964][ T7225] ? down_read+0x109/0x430 [ 873.775384][ T7225] ? key_default_cmp+0x90/0x90 [ 873.781727][ T7225] ? down_read_killable+0x490/0x490 [ 873.787074][ T7225] ? dh_data_from_key+0x18c/0x2b0 [ 873.792099][ T7225] kmemdup+0x27/0x60 [ 873.796020][ T7225] dh_data_from_key+0x18c/0x2b0 [ 873.800878][ T7225] __keyctl_dh_compute+0x4f5/0x1470 [ 873.806096][ T7225] ? mark_lock+0xc2/0x1220 [ 873.810513][ T7225] ? get_pid_task+0xc9/0x180 [ 873.815225][ T7225] ? __kasan_check_read+0x11/0x20 [ 873.820257][ T7225] ? dh_data_from_key+0x2b0/0x2b0 [ 873.825283][ T7225] ? find_held_lock+0x35/0x130 [ 873.830045][ T7225] ? __might_fault+0x12b/0x1e0 [ 873.834815][ T7225] ? find_held_lock+0x35/0x130 [ 873.839573][ T7225] ? __might_fault+0x12b/0x1e0 [ 873.844338][ T7225] ? lock_downgrade+0x920/0x920 [ 873.849180][ T7225] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 873.855418][ T7225] ? _copy_from_user+0x12c/0x1a0 [ 873.860383][ T7225] keyctl_dh_compute+0xcf/0x12d [ 873.865241][ T7225] ? __keyctl_dh_compute+0x1470/0x1470 [ 873.870720][ T7225] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 873.876183][ T7225] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 873.881685][ T7225] ? do_syscall_64+0x26/0x790 [ 873.886348][ T7225] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 873.892423][ T7225] ? do_syscall_64+0x26/0x790 [ 873.897114][ T7225] __x64_sys_keyctl+0x159/0x470 [ 873.901961][ T7225] do_syscall_64+0xfa/0x790 [ 873.906453][ T7225] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 873.912335][ T7225] RIP: 0033:0x45a639 [ 873.916232][ T7225] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 873.935844][ T7225] RSP: 002b:00007f23a6a90c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa 06:43:16 executing program 2 (fault-call:5 fault-nth:6): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 873.944277][ T7225] RAX: ffffffffffffffda RBX: 00007f23a6a90c90 RCX: 000000000045a639 [ 873.952268][ T7225] RDX: 0000000020000700 RSI: 0000000020000000 RDI: 0000000000000017 [ 873.960400][ T7225] RBP: 000000000075bf20 R08: 0000000020000040 R09: 0000000000000000 [ 873.968383][ T7225] R10: 0000000000000356 R11: 0000000000000246 R12: 00007f23a6a916d4 [ 873.976355][ T7225] R13: 00000000004c6d7c R14: 00000000004dc240 R15: 0000000000000004 [ 874.036207][ T7239] Dev loop5: unable to read RDB block 9 [ 874.041832][ T7239] loop5: AHDI p1 p2 p4 [ 874.085364][ T7239] loop5: partition table partially beyond EOD, truncated [ 874.156342][ T7239] loop5: p1 start 1362130174 is beyond EOD, truncated 06:43:17 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0xf, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) [ 874.218816][ T7239] loop5: p2 start 1256873442 is beyond EOD, truncated [ 874.279404][ T7250] FAULT_INJECTION: forcing a failure. [ 874.279404][ T7250] name failslab, interval 1, probability 0, space 0, times 0 [ 874.323624][ T7250] CPU: 0 PID: 7250 Comm: syz-executor.2 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 874.333485][ T7250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 874.343812][ T7250] Call Trace: [ 874.347123][ T7250] dump_stack+0x197/0x210 [ 874.351481][ T7250] should_fail.cold+0xa/0x15 [ 874.356101][ T7250] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 874.361661][ T7250] ? fault_create_debugfs_attr+0x180/0x180 [ 874.367461][ T7250] ? ___might_sleep+0x163/0x2c0 [ 874.372313][ T7250] __should_failslab+0x121/0x190 [ 874.377254][ T7250] should_failslab+0x9/0x14 [ 874.381748][ T7250] __kmalloc+0x2e0/0x770 [ 874.386152][ T7250] ? refcount_dec_and_test_checked+0x1b/0x20 [ 874.392146][ T7250] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 874.398540][ T7250] ? key_put+0x36/0x90 [ 874.402605][ T7250] ? dh_data_from_key+0x9d/0x2b0 [ 874.407540][ T7250] ? __keyctl_dh_compute+0x535/0x1470 [ 874.412915][ T7250] __keyctl_dh_compute+0x535/0x1470 [ 874.418096][ T7250] ? mark_lock+0xc2/0x1220 [ 874.422508][ T7250] ? dh_data_from_key+0x2b0/0x2b0 [ 874.427529][ T7250] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 874.432982][ T7250] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 874.438428][ T7250] ? lockdep_hardirqs_on+0x421/0x5e0 [ 874.443718][ T7250] ? retint_kernel+0x2b/0x2b [ 874.448311][ T7250] ? trace_hardirqs_on_caller+0x6a/0x240 [ 874.453942][ T7250] ? __this_cpu_preempt_check+0x35/0x190 [ 874.459637][ T7250] ? retint_kernel+0x2b/0x2b [ 874.464242][ T7250] ? _copy_from_user+0x122/0x1a0 [ 874.469218][ T7250] ? kcov_common_handle+0x20/0x20 [ 874.474236][ T7250] ? _copy_from_user+0x12c/0x1a0 [ 874.479162][ T7250] keyctl_dh_compute+0xcf/0x12d [ 874.484009][ T7250] ? __keyctl_dh_compute+0x1470/0x1470 [ 874.489466][ T7250] ? fput+0x1b/0x20 [ 874.493277][ T7250] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 874.498746][ T7250] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 874.504844][ T7250] ? do_syscall_64+0x26/0x790 [ 874.509638][ T7250] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 874.515715][ T7250] ? do_syscall_64+0x26/0x790 [ 874.520415][ T7250] __x64_sys_keyctl+0x159/0x470 [ 874.525275][ T7250] do_syscall_64+0xfa/0x790 [ 874.529773][ T7250] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 874.535652][ T7250] RIP: 0033:0x45a639 [ 874.539537][ T7250] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 874.559393][ T7250] RSP: 002b:00007f23a6a90c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 874.567813][ T7250] RAX: ffffffffffffffda RBX: 00007f23a6a90c90 RCX: 000000000045a639 [ 874.575901][ T7250] RDX: 0000000020000700 RSI: 0000000020000000 RDI: 0000000000000017 [ 874.586141][ T7250] RBP: 000000000075bf20 R08: 0000000020000040 R09: 0000000000000000 [ 874.594124][ T7250] R10: 0000000000000356 R11: 0000000000000246 R12: 00007f23a6a916d4 [ 874.602084][ T7250] R13: 00000000004c6d7c R14: 00000000004dc240 R15: 0000000000000004 06:43:17 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="ae02e0285451423020bf4bb1f233a32d034ce718517fcc6feba8e13da3f25b822c0caedef77480025ed03931ee0b25e16c7076dc14f2a83a792218e2b0b46859f6438e099db7873db886a5c2ec0af2826d2a73e5d79e78a2715eec7f36ebcb312e87f7daeb6e6ecce7f88fbeb7f8890e11d6b35f2e49df09ca6eebc2f0835a280ad84abbc9b3ed31e1438048ff5afe722d3ed3a1af7a6c3e7f07f4a4de58443e264fc6d7335bd326c747772daea7f42d3931f7c59a4749d5e442256b10b60b27f3275ff8c981b2a4af2c283fb1f40cde0ba30ee1fc087f1171c45758df7897fa1b2ac8495490210035d99bf4909d8c905b0260dbac903596c5c7839b193cf57c796bd3b69490f7bd0adfebdb296ecfa3cc994d1e7b76d5b694b00bb8d679376928697520adbcef9b513fcc92f216420ea95f9fc5e71fd22a982563cf9b4cec57ac66cc420d94c88569f5a715292bd8450735cff08fd4f684400190df78a309c02f3fefe507231903f56f4f2fccbd37fb5d54441029b822f4ceccc68adadfdd458ec5c89d2982343c0cd23039db490f92a3541b049763d04c66c08bca633fb681f0a757506766488271f7d3d8375ce360c3bc1ff3820b62875ad7521b34dce16e3ec439ad7219f0513074fe296b1cfa7fd5d05f4aea5de26fa70bd4e6c0934c0a11af974a066df40f61434a", 0x1eb, 0x3}]) 06:43:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x8, 0x0, 0x0, 0x0, 0x41c1, 0x1e24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000100)='/dev/dmmidi#\x00', 0xccb, 0x202040) getrandom(&(0x7f0000000580)=""/168, 0xa8, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r1, 0x401c5820, &(0x7f0000000180)=0x18) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000bc0)={{{@in=@remote, @in6=@ipv4={[], [], @remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@broadcast}}, &(0x7f0000000cc0)=0xe8) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r3, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r3, 0x401c5820, &(0x7f0000000180)=0x18) bind$xdp(0xffffffffffffffff, &(0x7f0000000d00)={0x2c, 0x2, r2, 0x1, r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) ioctl$SIOCX25SCALLUSERDATA(0xffffffffffffffff, 0x89e5, &(0x7f0000000640)={0x44, "fefa95da203537424924e218519e2dd1134a623c044ad205ca5a2239c66d533977a173a3c8e1b3a761efe2e80d56befe0fb51ab4a2275cb0604f74a89b98da5729c5d5a5871c49b1b851da7b3b2836aeb423a5bdd9a5b8721f79a397df727279f7a71f9ed6c0b61d55db70d051e12b65e9366be66585614e3b302a7e90f6dafb"}) write$cgroup_int(r4, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r4, 0x401c5820, &(0x7f0000000180)=0x18) getsockopt$inet_sctp6_SCTP_CONTEXT(r4, 0x84, 0x11, &(0x7f0000000480)={0x0, 0x3}, &(0x7f00000004c0)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000500)=@assoc_value={r5, 0x6}, &(0x7f0000000540)=0x8) accept$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000001c0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in=@multicast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@multicast2}}, &(0x7f0000000300)=0xffffffffffffff3b) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000440)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0xee014532a360c6f}, 0xc, &(0x7f0000000400)={&(0x7f0000000340)={0x98, 0x0, 0x1, 0x70bd2d, 0x25dfdbfb, {}, [{{0x8, 0x1, r6}, {0x7c, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x4}}}]}}]}, 0x98}, 0x1, 0x0, 0x0, 0x84}, 0x400105c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r8 = syz_open_dev$binderN(&(0x7f00000000c0)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_GET_NODE_INFO_FOR_REF(r8, 0xc018620c, &(0x7f0000000700)={0x1}) 06:43:17 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}}}, 0x78) 06:43:17 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x21, 0xffffffffffffffff, 0x0}, 0x0) 06:43:17 executing program 2 (fault-call:5 fault-nth:7): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:17 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x21, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) 06:43:17 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}}}, 0x78) [ 874.903367][ T7281] Dev loop5: unable to read RDB block 9 [ 874.906582][ T7269] FAULT_INJECTION: forcing a failure. [ 874.906582][ T7269] name failslab, interval 1, probability 0, space 0, times 0 [ 874.909978][ T7281] loop5: AHDI p1 p2 p4 [ 874.922853][ T7269] CPU: 0 PID: 7269 Comm: syz-executor.2 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 874.936979][ T7269] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 874.947070][ T7269] Call Trace: [ 874.950382][ T7269] dump_stack+0x197/0x210 [ 874.956087][ T7269] should_fail.cold+0xa/0x15 [ 874.960967][ T7269] ? fault_create_debugfs_attr+0x180/0x180 [ 874.966983][ T7269] ? ___might_sleep+0x163/0x2c0 [ 874.971950][ T7269] __should_failslab+0x121/0x190 [ 874.972421][ T7287] binder: 7271:7287 ioctl c018620c 20000700 returned -1 [ 874.977097][ T7269] should_failslab+0x9/0x14 [ 874.977113][ T7269] __kmalloc+0x2e0/0x770 [ 874.977132][ T7269] ? crypto_alg_lookup+0x77/0x1d0 [ 874.989928][ T7281] loop5: partition table partially beyond EOD, truncated [ 874.992896][ T7269] ? crypto_create_tfm+0x82/0x300 [ 874.992915][ T7269] crypto_create_tfm+0x82/0x300 [ 874.992927][ T7269] ? crypto_alg_mod_lookup+0xff/0x550 [ 874.992941][ T7269] crypto_alloc_tfm+0x105/0x2e0 [ 874.992962][ T7269] crypto_alloc_kpp+0x2d/0x40 [ 874.992982][ T7269] __keyctl_dh_compute+0x57f/0x1470 [ 874.993001][ T7269] ? mark_held_locks+0xa4/0xf0 [ 875.005032][ T7269] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 875.005049][ T7269] ? trace_hardirqs_on_thunk+0x1a/0x1c 06:43:17 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}}}, 0x78) [ 875.005068][ T7269] ? lockdep_hardirqs_on+0x421/0x5e0 [ 875.005091][ T7269] ? dh_data_from_key+0x2b0/0x2b0 [ 875.015030][ T7269] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 875.015049][ T7269] ? __might_fault+0x12b/0x1e0 [ 875.015065][ T7269] ? find_held_lock+0x35/0x130 [ 875.015081][ T7269] ? __might_fault+0x12b/0x1e0 [ 875.032232][ T7281] loop5: p1 start 1362130174 is beyond EOD, truncated [ 875.035508][ T7269] ? lock_downgrade+0x920/0x920 [ 875.035525][ T7269] ? lock_acquire+0x20b/0x410 [ 875.035552][ T7269] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 875.051434][ T7281] loop5: p2 start 1256873442 is beyond EOD, truncated [ 875.056868][ T7269] ? _copy_from_user+0x12c/0x1a0 [ 875.056889][ T7269] keyctl_dh_compute+0xcf/0x12d [ 875.056911][ T7269] ? __keyctl_dh_compute+0x1470/0x1470 [ 875.056925][ T7269] ? fput+0x1b/0x20 [ 875.056946][ T7269] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 875.056968][ T7269] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 875.141340][ T7269] ? do_syscall_64+0x26/0x790 [ 875.146037][ T7269] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 875.152231][ T7269] ? do_syscall_64+0x26/0x790 [ 875.157194][ T7269] __x64_sys_keyctl+0x159/0x470 [ 875.162066][ T7269] do_syscall_64+0xfa/0x790 [ 875.166598][ T7269] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 875.172501][ T7269] RIP: 0033:0x45a639 [ 875.176408][ T7269] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 875.196040][ T7269] RSP: 002b:00007f23a6a90c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa 06:43:18 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0xf00, 0xffffffffffffffff, 0x0}, 0x0) 06:43:18 executing program 2 (fault-call:5 fault-nth:8): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 875.204470][ T7269] RAX: ffffffffffffffda RBX: 00007f23a6a90c90 RCX: 000000000045a639 [ 875.212459][ T7269] RDX: 0000000020000700 RSI: 0000000020000000 RDI: 0000000000000017 [ 875.220446][ T7269] RBP: 000000000075bf20 R08: 0000000020000040 R09: 0000000000000000 [ 875.228442][ T7269] R10: 0000000000000356 R11: 0000000000000246 R12: 00007f23a6a916d4 [ 875.236570][ T7269] R13: 00000000004c6d7c R14: 00000000004dc240 R15: 0000000000000004 [ 875.354098][ T7281] Dev loop5: unable to read RDB block 9 [ 875.361212][ T7281] loop5: AHDI p1 p2 p4 [ 875.380652][ T7281] loop5: partition table partially beyond EOD, truncated [ 875.392774][ T7281] loop5: p1 start 1362130174 is beyond EOD, truncated 06:43:18 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa0fce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) [ 875.400379][ T7281] loop5: p2 start 1256873442 is beyond EOD, truncated 06:43:18 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}}}, 0x78) [ 875.474178][ T7299] FAULT_INJECTION: forcing a failure. [ 875.474178][ T7299] name failslab, interval 1, probability 0, space 0, times 0 [ 875.549745][ T7299] CPU: 1 PID: 7299 Comm: syz-executor.2 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 875.559825][ T7299] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 875.570103][ T7299] Call Trace: [ 875.573420][ T7299] dump_stack+0x197/0x210 [ 875.577791][ T7299] should_fail.cold+0xa/0x15 [ 875.582407][ T7299] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 875.587895][ T7299] ? fault_create_debugfs_attr+0x180/0x180 [ 875.593806][ T7299] ? ___might_sleep+0x163/0x2c0 [ 875.598666][ T7299] __should_failslab+0x121/0x190 [ 875.603638][ T7299] should_failslab+0x9/0x14 [ 875.608166][ T7299] kmem_cache_alloc_trace+0x2d3/0x790 [ 875.613564][ T7299] mpi_alloc+0x47/0x240 [ 875.617739][ T7299] mpi_read_raw_data+0xdc/0x3f0 [ 875.622619][ T7299] ? crypto_dh_decode_key+0x578/0x690 [ 875.628041][ T7299] dh_set_secret+0x109/0x2e0 [ 875.632654][ T7299] ? dh_exit_tfm+0x20/0x20 [ 875.637134][ T7299] __keyctl_dh_compute+0x610/0x1470 [ 875.642358][ T7299] ? mark_lock+0xc2/0x1220 [ 875.646863][ T7299] ? get_pid_task+0xc9/0x180 [ 875.651609][ T7299] ? dh_data_from_key+0x2b0/0x2b0 [ 875.656653][ T7299] ? find_held_lock+0x35/0x130 [ 875.661452][ T7299] ? __might_fault+0x12b/0x1e0 [ 875.666232][ T7299] ? find_held_lock+0x35/0x130 [ 875.671030][ T7299] ? __might_fault+0x12b/0x1e0 [ 875.675907][ T7299] ? lock_downgrade+0x920/0x920 [ 875.680846][ T7299] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 875.687079][ T7299] ? _copy_from_user+0x12c/0x1a0 [ 875.692009][ T7299] keyctl_dh_compute+0xcf/0x12d [ 875.696868][ T7299] ? __keyctl_dh_compute+0x1470/0x1470 [ 875.702340][ T7299] ? fput+0x1b/0x20 [ 875.706487][ T7299] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 875.717701][ T7299] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 875.723173][ T7299] ? do_syscall_64+0x26/0x790 [ 875.727860][ T7299] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 875.733940][ T7299] ? do_syscall_64+0x26/0x790 [ 875.738721][ T7299] __x64_sys_keyctl+0x159/0x470 [ 875.743597][ T7299] do_syscall_64+0xfa/0x790 [ 875.748128][ T7299] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 875.754143][ T7299] RIP: 0033:0x45a639 [ 875.758042][ T7299] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 875.777781][ T7299] RSP: 002b:00007f23a6a90c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 875.786251][ T7299] RAX: ffffffffffffffda RBX: 00007f23a6a90c90 RCX: 000000000045a639 06:43:18 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) [ 875.794216][ T7299] RDX: 0000000020000700 RSI: 0000000020000000 RDI: 0000000000000017 [ 875.802269][ T7299] RBP: 000000000075bf20 R08: 0000000020000040 R09: 0000000000000000 [ 875.810402][ T7299] R10: 0000000000000356 R11: 0000000000000246 R12: 00007f23a6a916d4 [ 875.818377][ T7299] R13: 00000000004c6d7c R14: 00000000004dc240 R15: 0000000000000004 06:43:18 executing program 3: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc058534b, &(0x7f0000000100)={0x9, 0x3, 0x91d, 0xae0, 0x9, 0x3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000080)={[{@uni_xlateno='uni_xlate=0'}], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imasig'}, {@smackfshat={'smackfshat', 0x3d, '(system\xe1}trusted,GPL'}}]}) 06:43:18 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x2100, 0xffffffffffffffff, 0x0}, 0x0) 06:43:18 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000}}}, 0x78) 06:43:18 executing program 2 (fault-call:5 fault-nth:9): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:18 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa21ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) 06:43:18 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000}}}, 0x78) [ 876.049187][ T7321] Dev loop5: unable to read RDB block 9 [ 876.065842][ T7321] loop5: AHDI p1 p2 p4 06:43:18 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3f00, 0xffffffffffffffff, 0x0}, 0x0) [ 876.121887][ T7321] loop5: partition table partially beyond EOD, truncated 06:43:19 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24000000}}}, 0x78) [ 876.186842][ T7321] loop5: p1 start 1362130174 is beyond EOD, truncated [ 876.237493][ T7326] FAULT_INJECTION: forcing a failure. [ 876.237493][ T7326] name failslab, interval 1, probability 0, space 0, times 0 [ 876.263585][ T7321] loop5: p2 start 1256873442 is beyond EOD, truncated [ 876.278456][ T7326] CPU: 1 PID: 7326 Comm: syz-executor.2 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 876.288572][ T7326] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 876.298678][ T7326] Call Trace: [ 876.301997][ T7326] dump_stack+0x197/0x210 [ 876.306349][ T7326] should_fail.cold+0xa/0x15 [ 876.310970][ T7326] ? fault_create_debugfs_attr+0x180/0x180 [ 876.316814][ T7326] ? ___might_sleep+0x163/0x2c0 [ 876.321805][ T7326] __should_failslab+0x121/0x190 [ 876.327467][ T7326] should_failslab+0x9/0x14 [ 876.331990][ T7326] __kmalloc+0x2e0/0x770 [ 876.336252][ T7326] ? kmem_cache_alloc_trace+0x397/0x790 [ 876.341846][ T7326] ? mpi_alloc_limb_space+0x33/0x60 [ 876.347061][ T7326] mpi_alloc_limb_space+0x33/0x60 [ 876.352185][ T7326] mpi_alloc+0x1a8/0x240 [ 876.356446][ T7326] mpi_read_raw_data+0xdc/0x3f0 [ 876.361308][ T7326] ? crypto_dh_decode_key+0x578/0x690 [ 876.366702][ T7326] dh_set_secret+0x109/0x2e0 [ 876.371349][ T7326] ? dh_exit_tfm+0x20/0x20 [ 876.375778][ T7326] ? retint_kernel+0x2b/0x2b [ 876.380402][ T7326] __keyctl_dh_compute+0x610/0x1470 [ 876.385614][ T7326] ? mark_lock+0xc2/0x1220 [ 876.390061][ T7326] ? dh_data_from_key+0x2b0/0x2b0 [ 876.395549][ T7326] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 876.401022][ T7326] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 876.406503][ T7326] ? lockdep_hardirqs_on+0x421/0x5e0 [ 876.412086][ T7326] ? retint_kernel+0x2b/0x2b [ 876.416699][ T7326] ? trace_hardirqs_on_caller+0x6a/0x240 [ 876.422347][ T7326] ? find_held_lock+0x35/0x130 [ 876.427143][ T7326] ? __this_cpu_preempt_check+0x35/0x190 [ 876.432809][ T7326] ? retint_kernel+0x2b/0x2b 06:43:19 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x0) [ 876.437427][ T7326] ? _copy_from_user+0x122/0x1a0 [ 876.442378][ T7326] ? __sanitizer_cov_trace_pc+0xd/0x50 [ 876.447870][ T7326] ? _copy_from_user+0x12c/0x1a0 [ 876.452825][ T7326] keyctl_dh_compute+0xcf/0x12d [ 876.457713][ T7326] ? __keyctl_dh_compute+0x1470/0x1470 [ 876.463180][ T7326] ? fput+0x1b/0x20 [ 876.467002][ T7326] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 876.472559][ T7326] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 876.478038][ T7326] ? do_syscall_64+0x26/0x790 [ 876.482724][ T7326] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 876.488807][ T7326] ? do_syscall_64+0x26/0x790 [ 876.493524][ T7326] __x64_sys_keyctl+0x159/0x470 [ 876.498388][ T7326] do_syscall_64+0xfa/0x790 [ 876.502909][ T7326] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 876.508803][ T7326] RIP: 0033:0x45a639 [ 876.512701][ T7326] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 06:43:19 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000}}}, 0x78) 06:43:19 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310ff5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) [ 876.532344][ T7326] RSP: 002b:00007f23a6a90c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 876.540760][ T7326] RAX: ffffffffffffffda RBX: 00007f23a6a90c90 RCX: 000000000045a639 [ 876.548819][ T7326] RDX: 0000000020000700 RSI: 0000000020000000 RDI: 0000000000000017 [ 876.556817][ T7326] RBP: 000000000075bf20 R08: 0000000020000040 R09: 0000000000000000 [ 876.564798][ T7326] R10: 0000000000000356 R11: 0000000000000246 R12: 00007f23a6a916d4 [ 876.572782][ T7326] R13: 00000000004c6d7c R14: 00000000004dc240 R15: 0000000000000004 [ 876.705298][ T7321] Dev loop5: unable to read RDB block 9 [ 876.711175][ T7321] loop5: AHDI p1 p2 p4 [ 876.749559][ T7321] loop5: partition table partially beyond EOD, truncated [ 876.771653][ T7321] loop5: p1 start 1362130174 is beyond EOD, truncated [ 876.798183][ T7321] loop5: p2 start 1256873442 is beyond EOD, truncated 06:43:19 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) [ 876.968882][ T7346] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value 06:43:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imasig'}, {@hash='hash'}]}) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0xc00) ioctl$TIOCSIG(r0, 0x40045436, 0x3e) 06:43:19 executing program 2 (fault-call:5 fault-nth:10): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:19 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa3121f5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) 06:43:19 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}}}, 0x78) 06:43:19 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x0) 06:43:19 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x57000000}}}, 0x78) [ 877.102987][ T7365] Dev loop5: unable to read RDB block 9 [ 877.122359][ T7365] loop5: AHDI p1 p2 p4 [ 877.130682][ T7365] loop5: partition table partially beyond EOD, truncated [ 877.165525][ T7365] loop5: p1 start 1362130174 is beyond EOD, truncated [ 877.196523][ T7365] loop5: p2 start 1256873442 is beyond EOD, truncated 06:43:20 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdaffffff}}}, 0x78) [ 877.346748][ T7384] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value [ 877.385607][ T7377] FAULT_INJECTION: forcing a failure. 06:43:20 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xf}, 0x0) 06:43:20 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850f90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) 06:43:20 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) [ 877.385607][ T7377] name failslab, interval 1, probability 0, space 0, times 0 [ 877.409362][ T7377] CPU: 0 PID: 7377 Comm: syz-executor.2 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 877.419321][ T7377] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 877.429394][ T7377] Call Trace: [ 877.432809][ T7377] dump_stack+0x197/0x210 [ 877.437150][ T7377] should_fail.cold+0xa/0x15 [ 877.441746][ T7377] ? fault_create_debugfs_attr+0x180/0x180 [ 877.447556][ T7377] ? __should_failslab+0x45/0x190 [ 877.452570][ T7377] __should_failslab+0x121/0x190 [ 877.457606][ T7377] should_failslab+0x9/0x14 [ 877.462126][ T7377] kmem_cache_alloc_trace+0x2d3/0x790 [ 877.467510][ T7377] mpi_alloc+0x47/0x240 [ 877.471690][ T7377] mpi_read_raw_data+0x2cb/0x3f0 [ 877.476631][ T7377] dh_set_secret+0x168/0x2e0 [ 877.481225][ T7377] ? dh_exit_tfm+0x20/0x20 [ 877.485726][ T7377] __keyctl_dh_compute+0x610/0x1470 [ 877.490922][ T7377] ? mark_held_locks+0xa4/0xf0 [ 877.495963][ T7377] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 877.501421][ T7377] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 877.506886][ T7377] ? lockdep_hardirqs_on+0x421/0x5e0 [ 877.512184][ T7377] ? dh_data_from_key+0x2b0/0x2b0 [ 877.517198][ T7377] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 877.522679][ T7377] ? lockdep_hardirqs_on+0x421/0x5e0 [ 877.527968][ T7377] ? retint_kernel+0x2b/0x2b [ 877.532542][ T7377] ? trace_hardirqs_on_caller+0x6a/0x240 [ 877.538179][ T7377] ? __this_cpu_preempt_check+0x35/0x190 [ 877.543812][ T7377] ? retint_kernel+0x2b/0x2b [ 877.548406][ T7377] ? __might_fault+0x1a1/0x1e0 [ 877.553304][ T7377] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 877.559551][ T7377] ? _copy_from_user+0x12c/0x1a0 [ 877.564495][ T7377] keyctl_dh_compute+0xcf/0x12d [ 877.569365][ T7377] ? __keyctl_dh_compute+0x1470/0x1470 [ 877.574831][ T7377] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 877.580285][ T7377] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 877.585732][ T7377] ? do_syscall_64+0x26/0x790 [ 877.590409][ T7377] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 877.596477][ T7377] ? do_syscall_64+0x26/0x790 [ 877.601167][ T7377] __x64_sys_keyctl+0x159/0x470 [ 877.606029][ T7377] do_syscall_64+0xfa/0x790 [ 877.610629][ T7377] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 877.616527][ T7377] RIP: 0033:0x45a639 [ 877.620428][ T7377] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 877.640044][ T7377] RSP: 002b:00007f23a6a90c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 877.648842][ T7377] RAX: ffffffffffffffda RBX: 00007f23a6a90c90 RCX: 000000000045a639 [ 877.656822][ T7377] RDX: 0000000020000700 RSI: 0000000020000000 RDI: 0000000000000017 [ 877.664804][ T7377] RBP: 000000000075bf20 R08: 0000000020000040 R09: 0000000000000000 [ 877.672862][ T7377] R10: 0000000000000356 R11: 0000000000000246 R12: 00007f23a6a916d4 [ 877.680844][ T7377] R13: 00000000004c6d7c R14: 00000000004dc240 R15: 0000000000000004 06:43:20 executing program 2 (fault-call:5 fault-nth:11): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 877.773120][ T7395] Dev loop5: unable to read RDB block 9 [ 877.778753][ T7395] loop5: AHDI p1 p2 p4 [ 877.790978][ T7395] loop5: partition table partially beyond EOD, truncated 06:43:20 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954852190ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) [ 877.819132][ T7395] loop5: p1 start 1362130174 is beyond EOD, truncated [ 877.836434][ T7395] loop5: p2 start 1256873442 is beyond EOD, truncated [ 877.861052][ T7384] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value 06:43:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imasig'}, {@hash='hash'}]}) 06:43:20 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffda}}}, 0x78) [ 877.960067][ T7407] FAULT_INJECTION: forcing a failure. [ 877.960067][ T7407] name failslab, interval 1, probability 0, space 0, times 0 [ 877.975868][ T7407] CPU: 0 PID: 7407 Comm: syz-executor.2 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 877.985708][ T7407] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 877.995873][ T7407] Call Trace: [ 877.999186][ T7407] dump_stack+0x197/0x210 [ 878.003543][ T7407] should_fail.cold+0xa/0x15 06:43:20 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78}, 0x23) [ 878.008150][ T7407] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 878.014435][ T7407] ? fault_create_debugfs_attr+0x180/0x180 [ 878.020283][ T7407] ? ___might_sleep+0x163/0x2c0 [ 878.025163][ T7407] __should_failslab+0x121/0x190 [ 878.030114][ T7407] should_failslab+0x9/0x14 [ 878.034625][ T7407] kmem_cache_alloc_trace+0x2d3/0x790 [ 878.040015][ T7407] mpi_alloc+0x47/0x240 [ 878.044206][ T7407] mpi_read_raw_data+0x2cb/0x3f0 [ 878.049172][ T7407] dh_set_secret+0x1a8/0x2e0 [ 878.053782][ T7407] ? dh_exit_tfm+0x20/0x20 [ 878.058220][ T7407] __keyctl_dh_compute+0x610/0x1470 [ 878.063433][ T7407] ? mark_held_locks+0xa4/0xf0 [ 878.068379][ T7407] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 878.073940][ T7407] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 878.079421][ T7407] ? lockdep_hardirqs_on+0x421/0x5e0 [ 878.084707][ T7407] ? dh_data_from_key+0x2b0/0x2b0 [ 878.089988][ T7407] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 878.095436][ T7407] ? __might_fault+0x12b/0x1e0 [ 878.100204][ T7407] ? find_held_lock+0x35/0x130 [ 878.104952][ T7407] ? __might_fault+0x12b/0x1e0 [ 878.109739][ T7407] ? lock_downgrade+0x920/0x920 [ 878.114573][ T7407] ? lock_acquire+0x20b/0x410 [ 878.119244][ T7407] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 878.125476][ T7407] ? _copy_from_user+0x12c/0x1a0 [ 878.130400][ T7407] keyctl_dh_compute+0xcf/0x12d [ 878.135339][ T7407] ? __keyctl_dh_compute+0x1470/0x1470 [ 878.140782][ T7407] ? fput+0x1b/0x20 [ 878.144584][ T7407] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 878.150080][ T7407] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 878.155623][ T7407] ? do_syscall_64+0x26/0x790 [ 878.160289][ T7407] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 878.166340][ T7407] ? do_syscall_64+0x26/0x790 [ 878.171019][ T7407] __x64_sys_keyctl+0x159/0x470 [ 878.176520][ T7407] do_syscall_64+0xfa/0x790 [ 878.181028][ T7407] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 878.186996][ T7407] RIP: 0033:0x45a639 [ 878.190880][ T7407] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 878.210470][ T7407] RSP: 002b:00007f23a6a90c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 878.218964][ T7407] RAX: ffffffffffffffda RBX: 00007f23a6a90c90 RCX: 000000000045a639 [ 878.226923][ T7407] RDX: 0000000020000700 RSI: 0000000020000000 RDI: 0000000000000017 [ 878.234893][ T7407] RBP: 000000000075bf20 R08: 0000000020000040 R09: 0000000000000000 [ 878.242848][ T7407] R10: 0000000000000356 R11: 0000000000000246 R12: 00007f23a6a916d4 [ 878.250827][ T7407] R13: 00000000004c6d7c R14: 00000000004dc240 R15: 0000000000000004 06:43:21 executing program 2 (fault-call:5 fault-nth:12): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:21 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x21}, 0x0) 06:43:21 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d0f4e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) [ 878.339598][ T7395] Dev loop5: unable to read RDB block 9 [ 878.352004][ T7395] loop5: AHDI p1 p2 p4 [ 878.356427][ T7395] loop5: partition table partially beyond EOD, truncated [ 878.369744][ T7395] loop5: p1 start 1362130174 is beyond EOD, truncated [ 878.377311][ T7395] loop5: p2 start 1256873442 is beyond EOD, truncated 06:43:21 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:43:21 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78}, 0x29) 06:43:21 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xf00}, 0x0) 06:43:21 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78}, 0x200001f8) 06:43:21 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d214e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) [ 878.747710][ T7437] FAULT_INJECTION: forcing a failure. [ 878.747710][ T7437] name failslab, interval 1, probability 0, space 0, times 0 [ 878.771685][ T7437] CPU: 1 PID: 7437 Comm: syz-executor.2 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 878.781629][ T7437] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 878.787616][ T7449] Dev loop5: unable to read RDB block 9 [ 878.791695][ T7437] Call Trace: [ 878.791724][ T7437] dump_stack+0x197/0x210 [ 878.791747][ T7437] should_fail.cold+0xa/0x15 [ 878.791768][ T7437] ? fault_create_debugfs_attr+0x180/0x180 [ 878.791785][ T7437] ? ___might_sleep+0x163/0x2c0 [ 878.791812][ T7437] __should_failslab+0x121/0x190 [ 878.825796][ T7437] should_failslab+0x9/0x14 [ 878.830319][ T7437] __kmalloc+0x2e0/0x770 [ 878.834601][ T7437] ? __keyctl_dh_compute+0x6d3/0x1470 [ 878.836881][ T7449] loop5: AHDI p1 p2 p4 [ 878.840004][ T7437] __keyctl_dh_compute+0x6d3/0x1470 [ 878.840027][ T7437] ? mark_lock+0xc2/0x1220 [ 878.840053][ T7437] ? dh_data_from_key+0x2b0/0x2b0 [ 878.840069][ T7437] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 878.840091][ T7437] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 878.886866][ T7437] ? lockdep_hardirqs_on+0x421/0x5e0 [ 878.892183][ T7437] ? retint_kernel+0x2b/0x2b [ 878.892763][ T7449] loop5: partition table partially beyond EOD, truncated [ 878.896786][ T7437] ? trace_hardirqs_on_caller+0x6a/0x240 [ 878.896804][ T7437] ? find_held_lock+0x35/0x130 [ 878.896832][ T7437] ? __this_cpu_preempt_check+0x35/0x190 [ 878.896848][ T7437] ? retint_kernel+0x2b/0x2b [ 878.896879][ T7437] ? copy_user_generic_unrolled+0x89/0xc0 [ 878.930210][ T7437] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 878.930227][ T7437] ? _copy_from_user+0x12c/0x1a0 [ 878.930249][ T7437] keyctl_dh_compute+0xcf/0x12d [ 878.930266][ T7437] ? __keyctl_dh_compute+0x1470/0x1470 [ 878.930276][ T7437] ? fput+0x1b/0x20 [ 878.930301][ T7437] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 878.946315][ T7437] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 878.946332][ T7437] ? do_syscall_64+0x26/0x790 [ 878.946350][ T7437] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 878.946364][ T7437] ? do_syscall_64+0x26/0x790 [ 878.946384][ T7437] __x64_sys_keyctl+0x159/0x470 [ 878.946406][ T7437] do_syscall_64+0xfa/0x790 [ 878.961184][ T7437] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 878.961199][ T7437] RIP: 0033:0x45a639 [ 878.961215][ T7437] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 878.961223][ T7437] RSP: 002b:00007f23a6a90c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 878.961237][ T7437] RAX: ffffffffffffffda RBX: 00007f23a6a90c90 RCX: 000000000045a639 [ 878.961246][ T7437] RDX: 0000000020000700 RSI: 0000000020000000 RDI: 0000000000000017 06:43:21 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) ioctl$SG_SCSI_RESET(r0, 0x2284, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r2, 0x401c5820, &(0x7f0000000180)=0x18) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r3, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r3, 0x401c5820, &(0x7f0000000180)=0x18) ioctl$SIOCX25CALLACCPTAPPRV(r3, 0x89e8) ioctl$VIDIOC_G_ENC_INDEX(r1, 0x8818564c, &(0x7f0000000b40)) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78}, 0x78) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000000040)=""/147, 0x93) [ 878.961255][ T7437] RBP: 000000000075bf20 R08: 0000000020000040 R09: 0000000000000000 [ 878.961263][ T7437] R10: 0000000000000356 R11: 0000000000000246 R12: 00007f23a6a916d4 [ 878.961275][ T7437] R13: 00000000004c6d7c R14: 00000000004dc240 R15: 0000000000000004 [ 879.002522][ T7449] loop5: p1 start 1362130174 is beyond EOD, truncated [ 879.098294][ T7449] loop5: p2 start 1256873442 is beyond EOD, truncated [ 879.122899][ T7425] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value [ 879.373988][ T7449] Dev loop5: unable to read RDB block 9 [ 879.395675][ T7449] loop5: AHDI p1 p2 p4 06:43:22 executing program 2 (fault-call:5 fault-nth:13): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:22 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x2100}, 0x0) 06:43:22 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e602358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) [ 879.412588][ T7449] loop5: partition table partially beyond EOD, truncated [ 879.435651][ T7449] loop5: p1 start 1362130174 is beyond EOD, truncated [ 879.484932][ T7449] loop5: p2 start 1256873442 is beyond EOD, truncated 06:43:22 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa04884577df278, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_open_dev$swradio(&(0x7f0000000280)='/dev/swradio#\x00', 0x1, 0x2) ioctl$VIDIOC_SUBDEV_QUERY_DV_TIMINGS(r2, 0x80845663, &(0x7f0000000340)={0x0, @reserved}) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fgetxattr(r0, &(0x7f0000000000)=@known='com.apple.system.Security\x00', &(0x7f0000000140)=""/162, 0xa2) r4 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x0, 0x0) dup2(r3, r4) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x0, 0x0) dup2(r5, r6) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f0000000100)={0x0, 0xffffffffffffffb3, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[], 0x34}}, 0x0) r7 = getuid() syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)={[], [{@func={'func', 0x3d, 'MMAP_CHECK'}}, {@smackfshat={'smackfshat', 0x3d, 'userppp1^eth1$(lonodevnodevcgroup(\\^,'}}, {@euid_eq={'euid', 0x3d, r7}}, {@hash='hash'}]}) r8 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000200)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r8, 0xc008551c, &(0x7f0000000240)={0x6c85, 0x20, [0x886, 0x3, 0x5c7, 0x7ff, 0x7ff, 0x3ff, 0x6, 0x800]}) 06:43:22 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e604358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) 06:43:22 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:43:22 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x3f00}, 0x0) [ 879.805285][ T7479] FAULT_INJECTION: forcing a failure. [ 879.805285][ T7479] name failslab, interval 1, probability 0, space 0, times 0 [ 879.842110][ T7479] CPU: 0 PID: 7479 Comm: syz-executor.2 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 879.852412][ T7479] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 879.864115][ T7479] Call Trace: [ 879.867449][ T7479] dump_stack+0x197/0x210 [ 879.871994][ T7479] should_fail.cold+0xa/0x15 [ 879.876700][ T7479] ? fault_create_debugfs_attr+0x180/0x180 [ 879.882536][ T7479] ? ___might_sleep+0x163/0x2c0 [ 879.887429][ T7479] __should_failslab+0x121/0x190 [ 879.892443][ T7479] should_failslab+0x9/0x14 [ 879.896970][ T7479] __kmalloc+0x2e0/0x770 [ 879.901317][ T7479] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 879.907700][ T7479] ? __phys_addr+0xa4/0x120 [ 879.912223][ T7479] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 879.918481][ T7479] ? __keyctl_dh_compute+0x768/0x1470 [ 879.923734][ T7487] QAT: Invalid ioctl [ 879.927769][ T7479] __keyctl_dh_compute+0x768/0x1470 [ 879.927786][ T7479] ? mark_lock+0xc2/0x1220 [ 879.927803][ T7479] ? __kasan_check_read+0x11/0x20 [ 879.927830][ T7479] ? dh_data_from_key+0x2b0/0x2b0 [ 879.927843][ T7479] ? find_held_lock+0x35/0x130 [ 879.927857][ T7479] ? __might_fault+0x12b/0x1e0 [ 879.927877][ T7479] ? __might_fault+0x12b/0x1e0 [ 879.927897][ T7479] ? lock_downgrade+0x920/0x920 [ 879.966984][ T7479] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 879.973246][ T7479] ? _copy_from_user+0x12c/0x1a0 [ 879.978221][ T7479] keyctl_dh_compute+0xcf/0x12d [ 879.983182][ T7479] ? __keyctl_dh_compute+0x1470/0x1470 [ 879.988807][ T7479] ? fput+0x1b/0x20 [ 879.992618][ T7479] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 879.998101][ T7479] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 880.003556][ T7479] ? do_syscall_64+0x26/0x790 [ 880.008248][ T7479] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 880.014323][ T7479] ? do_syscall_64+0x26/0x790 [ 880.019102][ T7479] __x64_sys_keyctl+0x159/0x470 [ 880.024082][ T7479] do_syscall_64+0xfa/0x790 [ 880.028616][ T7479] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 880.034517][ T7479] RIP: 0033:0x45a639 [ 880.038416][ T7479] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 880.058015][ T7479] RSP: 002b:00007f23a6a90c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 880.066518][ T7479] RAX: ffffffffffffffda RBX: 00007f23a6a90c90 RCX: 000000000045a639 [ 880.074565][ T7479] RDX: 0000000020000700 RSI: 0000000020000000 RDI: 0000000000000017 [ 880.082958][ T7479] RBP: 000000000075bf20 R08: 0000000020000040 R09: 0000000000000000 [ 880.090916][ T7479] R10: 0000000000000356 R11: 0000000000000246 R12: 00007f23a6a916d4 [ 880.099014][ T7479] R13: 00000000004c6d7c R14: 00000000004dc240 R15: 0000000000000004 06:43:22 executing program 2 (fault-call:5 fault-nth:14): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:22 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e60f358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) 06:43:23 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x2000000}, 0x0) [ 880.185129][ T7496] Dev loop5: unable to read RDB block 9 [ 880.222049][ T7496] loop5: AHDI p1 p2 p4 06:43:23 executing program 4: syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r2, 0x401c5820, &(0x7f0000000180)=0x18) ioctl$PIO_CMAP(r2, 0x4b71, &(0x7f0000000100)={0xfffffffffffffffa, 0x9, 0x6, 0x3, 0x8, 0xfffffffffffffff9}) dup2(r0, r1) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x0, 0x0) dup2(r3, r4) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x0, 0x0) dup2(r5, r6) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) pread64(r6, &(0x7f0000000200)=""/80, 0x50, 0x1ff) write$cgroup_int(r7, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r7, 0x401c5820, &(0x7f0000000180)=0x18) accept4$vsock_stream(r7, &(0x7f0000000040)={0x28, 0x0, 0x2710, @my=0x0}, 0x10, 0xc00) r8 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000080)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r9 = dup(r8) ioctl$SG_NEXT_CMD_LEN(r9, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r9, &(0x7f0000000180)={0x78}, 0x78) [ 880.290084][ T7496] loop5: partition table partially beyond EOD, truncated [ 880.320689][ T7485] FAT-fs (loop3): Unrecognized mount option "func=MMAP_CHECK" or missing value [ 880.388409][ T7496] loop5: p1 start 1362130174 is beyond EOD, truncated [ 880.401857][ T7496] loop5: p2 start 1256873442 is beyond EOD, truncated 06:43:23 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e621358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) [ 880.568307][ T7496] Dev loop5: unable to read RDB block 9 [ 880.593736][ T7496] loop5: AHDI p1 p2 p4 06:43:23 executing program 3: socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imasig'}, {@hash='hash'}]}) [ 880.628672][ T7509] FAULT_INJECTION: forcing a failure. [ 880.628672][ T7509] name failslab, interval 1, probability 0, space 0, times 0 [ 880.644031][ T7496] loop5: partition table partially beyond EOD, truncated 06:43:23 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x4000000}, 0x0) [ 880.698598][ T7496] loop5: p1 start 1362130174 is beyond EOD, truncated [ 880.730489][ T7509] CPU: 0 PID: 7509 Comm: syz-executor.2 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 880.740356][ T7509] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 880.740363][ T7509] Call Trace: [ 880.740387][ T7509] dump_stack+0x197/0x210 [ 880.740409][ T7509] should_fail.cold+0xa/0x15 [ 880.740429][ T7509] ? fault_create_debugfs_attr+0x180/0x180 [ 880.740448][ T7509] ? ___might_sleep+0x163/0x2c0 [ 880.740466][ T7509] __should_failslab+0x121/0x190 [ 880.740483][ T7509] should_failslab+0x9/0x14 [ 880.740500][ T7509] kmem_cache_alloc_trace+0x2d3/0x790 [ 880.740530][ T7509] mpi_alloc+0x47/0x240 [ 880.757636][ T7496] loop5: p2 start 1256873442 is beyond EOD, truncated [ 880.758423][ T7509] dh_compute_value+0x93/0x610 [ 880.804390][ T7509] ? dh_exit+0x20/0x20 [ 880.808540][ T7509] ? lockdep_init_map+0x1be/0x6d0 [ 880.813669][ T7509] __keyctl_dh_compute+0x9ae/0x1470 [ 880.818856][ T7509] ? mark_lock+0xc2/0x1220 [ 880.823259][ T7509] ? get_pid_task+0xc9/0x180 [ 880.827840][ T7509] ? dh_data_from_key+0x2b0/0x2b0 [ 880.832849][ T7509] ? find_held_lock+0x35/0x130 [ 880.837613][ T7509] ? __might_fault+0x12b/0x1e0 [ 880.842362][ T7509] ? __might_fault+0x12b/0x1e0 [ 880.847128][ T7509] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 880.853453][ T7509] ? _copy_from_user+0x12c/0x1a0 [ 880.858389][ T7509] keyctl_dh_compute+0xcf/0x12d [ 880.863312][ T7509] ? __keyctl_dh_compute+0x1470/0x1470 [ 880.868856][ T7509] __x64_sys_keyctl+0x159/0x470 [ 880.874051][ T7509] do_syscall_64+0xfa/0x790 [ 880.878543][ T7509] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 880.884418][ T7509] RIP: 0033:0x45a639 [ 880.888311][ T7509] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 880.907911][ T7509] RSP: 002b:00007f23a6a90c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 880.916308][ T7509] RAX: ffffffffffffffda RBX: 00007f23a6a90c90 RCX: 000000000045a639 [ 880.924274][ T7509] RDX: 0000000020000700 RSI: 0000000020000000 RDI: 0000000000000017 [ 880.932229][ T7509] RBP: 000000000075bf20 R08: 0000000020000040 R09: 0000000000000000 [ 880.940183][ T7509] R10: 0000000000000356 R11: 0000000000000246 R12: 00007f23a6a916d4 [ 880.948170][ T7509] R13: 00000000004c6d7c R14: 00000000004dc240 R15: 0000000000000004 [ 880.992023][ T7528] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value 06:43:23 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x4}, &(0x7f0000000300)) 06:43:23 executing program 2 (fault-call:5 fault-nth:15): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:23 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xf000000}, 0x0) [ 881.310972][ T7547] FAULT_INJECTION: forcing a failure. [ 881.310972][ T7547] name failslab, interval 1, probability 0, space 0, times 0 [ 881.323964][ T7547] CPU: 0 PID: 7547 Comm: syz-executor.2 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 881.333775][ T7547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 881.344030][ T7547] Call Trace: [ 881.347320][ T7547] dump_stack+0x197/0x210 [ 881.352425][ T7547] should_fail.cold+0xa/0x15 [ 881.357173][ T7547] ? fault_create_debugfs_attr+0x180/0x180 [ 881.363195][ T7547] ? ___might_sleep+0x163/0x2c0 [ 881.368040][ T7547] __should_failslab+0x121/0x190 [ 881.372968][ T7547] should_failslab+0x9/0x14 [ 881.377458][ T7547] __kmalloc+0x2e0/0x770 [ 881.381685][ T7547] ? trace_hardirqs_on_caller+0x6a/0x240 [ 881.387315][ T7547] ? mpi_resize+0x17a/0x207 [ 881.391825][ T7547] mpi_resize+0x17a/0x207 [ 881.396164][ T7547] mpi_powm+0x1dc/0x1d20 [ 881.400412][ T7547] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 881.406865][ T7547] ? debug_smp_processor_id+0x33/0x18a [ 881.412324][ T7547] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 881.419124][ T7547] ? mpi_alloc+0x47/0x240 [ 881.423477][ T7547] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 881.429012][ T7547] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 881.435175][ T7547] ? mpihelp_mul_karatsuba_case+0xd80/0xd80 [ 881.441082][ T7547] ? kmem_cache_alloc_trace+0x397/0x790 [ 881.446772][ T7547] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 881.453416][ T7547] dh_compute_value+0x373/0x610 [ 881.458271][ T7547] ? dh_exit+0x20/0x20 [ 881.462344][ T7547] ? lockdep_init_map+0x1be/0x6d0 [ 881.467365][ T7547] __keyctl_dh_compute+0x9ae/0x1470 [ 881.472550][ T7547] ? mark_lock+0xc2/0x1220 [ 881.476970][ T7547] ? get_pid_task+0xc9/0x180 [ 881.481575][ T7547] ? dh_data_from_key+0x2b0/0x2b0 [ 881.486711][ T7547] ? find_held_lock+0x35/0x130 [ 881.491556][ T7547] ? __might_fault+0x12b/0x1e0 [ 881.496759][ T7547] ? __might_fault+0x12b/0x1e0 [ 881.501534][ T7547] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 881.507949][ T7547] ? _copy_from_user+0x12c/0x1a0 [ 881.513184][ T7547] keyctl_dh_compute+0xcf/0x12d [ 881.518026][ T7547] ? __keyctl_dh_compute+0x1470/0x1470 [ 881.523468][ T7547] ? fput+0x1b/0x20 [ 881.527278][ T7547] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 881.533169][ T7547] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 881.538648][ T7547] ? do_syscall_64+0x26/0x790 [ 881.543344][ T7547] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 881.549412][ T7547] ? do_syscall_64+0x26/0x790 [ 881.554082][ T7547] __x64_sys_keyctl+0x159/0x470 [ 881.558927][ T7547] do_syscall_64+0xfa/0x790 [ 881.563419][ T7547] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 881.569317][ T7547] RIP: 0033:0x45a639 [ 881.573198][ T7547] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 881.592892][ T7547] RSP: 002b:00007f23a6a90c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 881.601299][ T7547] RAX: ffffffffffffffda RBX: 00007f23a6a90c90 RCX: 000000000045a639 [ 881.609270][ T7547] RDX: 0000000020000700 RSI: 0000000020000000 RDI: 0000000000000017 [ 881.617228][ T7547] RBP: 000000000075bf20 R08: 0000000020000040 R09: 0000000000000000 [ 881.625204][ T7547] R10: 0000000000000356 R11: 0000000000000246 R12: 00007f23a6a916d4 [ 881.633168][ T7547] R13: 00000000004c6d7c R14: 00000000004dc240 R15: 0000000000000004 06:43:24 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:43:24 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) symlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') openat$snapshot(0xffffffffffffff9c, &(0x7f0000000200)='/dev/snapshot\x00', 0xfe8549b3c8aab9fb, 0x0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) fstat(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, 0x0, 0x0, r2) getegid() getresgid(&(0x7f00000000c0)=0x0, &(0x7f0000000100), &(0x7f0000000140)) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x8daa}}}, 0xfffffcc6) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) 06:43:24 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x21000000}, 0x0) [ 881.662839][ T7528] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value 06:43:24 executing program 2 (fault-call:5 fault-nth:16): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:24 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0xf}, &(0x7f0000000300)) 06:43:24 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, &(0x7f0000000180)=0x18) ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) r1 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000040)=0x0) sched_getaffinity(r3, 0x8, &(0x7f0000000080)) r4 = dup(r1) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r4, &(0x7f0000000180)={0x78}, 0x78) 06:43:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="666f776665723c5f8d9b407e82f4df5814b387191dc0f3ab40398574445abc774662b4a3dab4204a56bb31374d50bec6e855e0694ab004dbffb845427b7ef725e3733725753d3433f4a00600f851ea03d86a5577f32150b678eb7e9d5e5a284078692283d3baac1559bbc2266f680ce5f5e9657bc39131a549e1e013133fed99dcfd44d56d74b380701ac298b2d51546be72d5b2c922640ba7d324830cbb9190eda4f2f1fba113fcc522f7327e3234a48ec0dc72662c89c218a151", @ANYRESDEC=0x0, @ANYBLOB="2c736d61636b66736861743de676626f786e657431402c61707072616973655f747970653d696d617369672c686173682c00"]) 06:43:24 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x3f000000}, 0x0) [ 882.003866][ T7572] Dev loop5: unable to read RDB block 9 [ 882.014188][ T7572] loop5: AHDI p1 p2 p4 [ 882.023370][ T7572] loop5: partition table partially beyond EOD, truncated [ 882.081991][ T7562] FAULT_INJECTION: forcing a failure. [ 882.081991][ T7562] name failslab, interval 1, probability 0, space 0, times 0 [ 882.097203][ T7562] CPU: 0 PID: 7562 Comm: syz-executor.2 Not tainted 5.4.0-rc8-next-20191120-syzkaller #0 [ 882.107938][ T7562] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 882.117999][ T7562] Call Trace: [ 882.118032][ T7562] dump_stack+0x197/0x210 [ 882.118056][ T7562] should_fail.cold+0xa/0x15 06:43:24 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x21}, &(0x7f0000000300)) [ 882.118072][ T7562] ? retint_kernel+0x2b/0x2b [ 882.118087][ T7562] ? fault_create_debugfs_attr+0x180/0x180 [ 882.118109][ T7562] __should_failslab+0x121/0x190 [ 882.145634][ T7562] should_failslab+0x9/0x14 [ 882.150158][ T7562] __kmalloc+0x2e0/0x770 [ 882.154439][ T7562] ? __keyctl_dh_compute+0xbde/0x1470 [ 882.159812][ T7562] __keyctl_dh_compute+0xbde/0x1470 [ 882.165014][ T7562] ? mark_lock+0xc2/0x1220 [ 882.169450][ T7562] ? dh_data_from_key+0x2b0/0x2b0 [ 882.174491][ T7562] ? find_held_lock+0x35/0x130 [ 882.174513][ T7562] ? __might_fault+0x12b/0x1e0 [ 882.174531][ T7562] ? __might_fault+0x12b/0x1e0 [ 882.174575][ T7562] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 882.190318][ T7572] loop5: p1 start 1362130174 is beyond EOD, truncated [ 882.195523][ T7562] ? _copy_from_user+0x12c/0x1a0 [ 882.195553][ T7562] keyctl_dh_compute+0xcf/0x12d [ 882.195570][ T7562] ? __keyctl_dh_compute+0x1470/0x1470 [ 882.195581][ T7562] ? fput+0x1b/0x20 [ 882.195601][ T7562] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 882.195615][ T7562] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 882.195635][ T7562] ? do_syscall_64+0x26/0x790 [ 882.227661][ T7572] loop5: p2 start 1256873442 is beyond EOD, truncated [ 882.233059][ T7562] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 882.233077][ T7562] ? do_syscall_64+0x26/0x790 [ 882.233098][ T7562] __x64_sys_keyctl+0x159/0x470 [ 882.233118][ T7562] do_syscall_64+0xfa/0x790 [ 882.233135][ T7562] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 882.233146][ T7562] RIP: 0033:0x45a639 [ 882.233160][ T7562] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 882.233167][ T7562] RSP: 002b:00007f23a6a90c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000fa [ 882.305593][ T7562] RAX: ffffffffffffffda RBX: 00007f23a6a90c90 RCX: 000000000045a639 [ 882.313606][ T7562] RDX: 0000000020000700 RSI: 0000000020000000 RDI: 0000000000000017 [ 882.321678][ T7562] RBP: 000000000075bf20 R08: 0000000020000040 R09: 0000000000000000 [ 882.329723][ T7562] R10: 0000000000000356 R11: 0000000000000246 R12: 00007f23a6a916d4 [ 882.337714][ T7562] R13: 00000000004c6d7c R14: 00000000004dc240 R15: 0000000000000004 06:43:25 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x200000000000000}, 0x0) 06:43:25 executing program 2 (fault-call:5 fault-nth:17): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 882.493364][ T7572] Dev loop5: unable to read RDB block 9 [ 882.521242][ T7579] FAT-fs (loop3): Unrecognized mount option "fowfer<_›@~‚ôßX³‡Àó«@9…tDZ¼wFb´£Ú´ JV»17MP¾ÆèUàiJ°Ûÿ¸EB{~÷%ãs7%u=43ô " or missing value [ 882.522545][ T7572] loop5: AHDI p1 p2 p4 06:43:25 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2, 0x2}, &(0x7f0000000300)) [ 882.566077][ T7572] loop5: partition table partially beyond EOD, truncated [ 882.574060][ T7572] loop5: p1 start 1362130174 is beyond EOD, truncated [ 882.581020][ T7572] loop5: p2 start 1256873442 is beyond EOD, truncated 06:43:25 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:43:25 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imasig'}, {@hash='hash'}]}) 06:43:25 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x400000000000000}, 0x0) 06:43:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:25 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) timerfd_create(0x6, 0x0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x0, 0x0) dup2(r2, r3) r4 = fcntl$dupfd(0xffffffffffffffff, 0x406, r3) timerfd_gettime(r4, &(0x7f0000000040)) ioctl$TIOCNXCL(r1, 0x540d) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x30001, 0x0) ioctl$TIOCLINUX3(r5, 0x541c, &(0x7f00000000c0)) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x400, 0x0) ioctl$SNDRV_TIMER_IOCTL_START(r6, 0x54a0) write$FUSE_ATTR(r1, &(0x7f0000000200)={0x78, 0x2f, 0x0, {0x0, 0x0, 0x0, {0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}}}, 0x78) [ 882.954637][ T7612] Dev loop5: unable to read RDB block 9 06:43:25 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2, 0x4}, &(0x7f0000000300)) [ 883.077801][ T7612] loop5: AHDI p1 p2 p4 [ 883.119274][ T7612] loop5: partition table partially beyond EOD, truncated 06:43:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x2, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:26 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xf00000000000000}, 0x0) [ 883.222462][ T7612] loop5: p1 start 1362130174 is beyond EOD, truncated [ 883.229300][ T7612] loop5: p2 start 1256873442 is beyond EOD, truncated 06:43:26 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:43:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x3, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 883.400267][ T7616] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value 06:43:26 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2, 0xf}, &(0x7f0000000300)) 06:43:26 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x2100000000000000}, 0x0) [ 883.575470][ T7639] sg_write: data in/out 11/37 bytes for SCSI command 0x0-- guessing data in; [ 883.575470][ T7639] program syz-executor.4 not setting count and/or reply_len properly [ 883.680637][ T7649] Dev loop5: unable to read RDB block 9 [ 883.691959][ T7649] loop5: AHDI p1 p2 p4 [ 883.696447][ T7649] loop5: partition table partially beyond EOD, truncated [ 883.705039][ T7649] loop5: p1 start 1362130174 is beyond EOD, truncated [ 883.712997][ T7649] loop5: p2 start 1256873442 is beyond EOD, truncated 06:43:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, &(0x7f0000000180)=0x18) ioctl$VIDIOC_S_INPUT(r0, 0xc0045627, &(0x7f0000000000)=0x8) r1 = semget$private(0x0, 0x2000000010a, 0x0) semop(r1, &(0x7f0000000080)=[{0x0, 0x2}, {}], 0x2) semop(r1, &(0x7f0000000000)=[{0x0, 0xffffffff}], 0x1) semop(r1, &(0x7f0000000080)=[{0x0, 0xfe}], 0x1) fstat(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, 0x0, 0x0, r2) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) lstat(&(0x7f0000000040)='./file1\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(r1, 0x0, 0x1, &(0x7f00000001c0)={{0x1f, 0xee01, r2, r4, r5, 0x120, 0x4}, 0x2, 0x78a, 0x6}) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB='B$wner<', @ANYRESDEC=0x0, @ANYBLOB="2c736d61636b66736861743de676626f786e657431402c6170707221108308dd4cfc1700f5ffffff0000002c686173682c00"]) 06:43:26 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2, 0x21}, &(0x7f0000000300)) 06:43:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x4, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 883.757965][ T7639] sg_write: data in/out 11/37 bytes for SCSI command 0x0-- guessing data in; [ 883.757965][ T7639] program syz-executor.4 not setting count and/or reply_len properly 06:43:26 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}}}, 0x78) [ 883.893725][ T7649] Dev loop5: unable to read RDB block 9 [ 883.912735][ T7649] loop5: AHDI p1 p2 p4 [ 883.917111][ T7649] loop5: partition table partially beyond EOD, truncated [ 883.926004][ T7649] loop5: p1 start 1362130174 is beyond EOD, truncated [ 883.933601][ T7649] loop5: p2 start 1256873442 is beyond EOD, truncated 06:43:26 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x3f00000000000000}, 0x0) 06:43:26 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="ae02e0285451423020bf4bb1f233a32d034ce718517fcc6feba8e13da3f25b822c0caedef77480025ed03931ee0b25e16c7076dc14f2a83a792218e2b0b46859f6528e099db7873db886a5c2ec0af2826d2a73e5d79e78a2715eec7f36ebcb312e87f7daeb6e6ecce7f88fbeb7f8890e11d6b35f2e49df09ca6eebc2f0835a280ad84abbc9b3ed31e1438048ff5afe722d3ed3a1af7a6c3e7f07f4a4de58443e264fc6d7335bd326c747772daea7f42d3931f7c59a4749d5e442256b10b60b27f3275ff8c981b2a4af2c283fb1f40cde0ba30ee1fc087f1171c45758df7897fa1b2ac8495490210035d99bf4909d8c905b0260dbac903596c5c7839b193cf57c796bd3b69490f7bd0adfebdb296ecfa3cc994d1e7b76d5b694b00bb8d679376928697520adbcef9b513fcc92f216420ea95f9fc5e71fd22a982563cf9b4cec57ac66cc420d94c88569f5a715292bd8450735cff08fd4f684400190df78a309c02f3fefe507231903f56f4f2fccbd37fb5d54441029b822f4ceccc68adadfdd458ec5c89d2982343c0cd23039db490f92a3541b049763d04c66c08bca633fb681f0a757506766488271f7d3d8375ce360c3bc1ff3820b62875ad7521b34dce16e3ec439ad7219f0513074fe296b1cfa7fd5d05f4aea5de26fa70bd4e6c0934c0a11af974a066df40f61434a", 0x1eb, 0x3}]) 06:43:26 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) r2 = getpid() process_vm_writev(r2, &(0x7f0000000100)=[{&(0x7f0000000180)=""/180, 0xfffffec3}, {&(0x7f0000000080)=""/11, 0xb}, {&(0x7f0000000240)=""/113, 0x7f}, {&(0x7f0000000500)=""/34, 0x22}, {&(0x7f00000002c0)=""/60, 0x3c}, {&(0x7f0000000300)=""/201, 0xc9}], 0x6, &(0x7f00000009c0)=[{&(0x7f0000000580)=""/127, 0x21}, {&(0x7f0000000600)=""/83, 0x53}, {&(0x7f0000000400)=""/62, 0x3e}, {&(0x7f0000000680)=""/65, 0x57}, {&(0x7f0000000700)=""/117, 0x75}, {&(0x7f0000000780)=""/151, 0x97}, {&(0x7f0000000840)=""/220, 0xdc}], 0x7, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='Hdev/capi20\x00', 0x0, 0x0) dup2(r3, r4) fstat(r3, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0xe2a7e9a8836bc8b9, 0x0, {0x0, 0x4, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5}}}, 0x78) 06:43:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x5, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:26 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2, 0xf00}, &(0x7f0000000300)) 06:43:27 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = getpid() process_vm_writev(r1, &(0x7f0000000480)=[{&(0x7f0000000180)=""/182, 0xb6}, {&(0x7f0000000080)=""/11, 0xb}, {&(0x7f0000000240)=""/127, 0x7f}, {&(0x7f0000000500)=""/34, 0x20}, {&(0x7f00000002c0)=""/60, 0x3c}, {&(0x7f0000000300)=""/201, 0xc9}], 0x6, &(0x7f0000000940)=[{&(0x7f0000000580)=""/127, 0x7f}, {&(0x7f0000000600)=""/83, 0x53}, {&(0x7f0000000400)=""/62, 0x3e}, {&(0x7f0000000680)=""/87, 0xac}, {&(0x7f0000000700)=""/117, 0xfffffee0}, {&(0x7f0000000780)=""/151, 0x97}, {&(0x7f0000000840)=""/220, 0xdc}], 0x7, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r2, 0x401c5820, &(0x7f0000000180)=0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000240)={r2, 0xc0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=0x390000000000000, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x9, 0x5}, 0x0, 0x0, &(0x7f0000000100)={0x1, 0x2, 0x9, 0x9}, &(0x7f0000000140)=0x5, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=0x100}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r1, 0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000040)='/dev/sg#\x00', r3}, 0x30) r4 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r4, &(0x7f0000000180)={0x78}, 0x78) 06:43:27 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x8000000000000000}, 0x0) [ 884.219139][ T7689] Dev loop5: unable to read RDB block 9 [ 884.249218][ T7689] loop5: AHDI p1 p2 p4 06:43:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x6, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 884.272704][ T7689] loop5: partition table partially beyond EOD, truncated [ 884.298071][ T7689] loop5: p1 start 1362130174 is beyond EOD, truncated [ 884.321377][ T7689] loop5: p2 start 1256873442 is beyond EOD, truncated [ 884.445702][ T7689] Dev loop5: unable to read RDB block 9 [ 884.451620][ T7689] loop5: AHDI p1 p2 p4 [ 884.489374][ T7689] loop5: partition table partially beyond EOD, truncated [ 884.542604][ T7689] loop5: p1 start 1362130174 is beyond EOD, truncated [ 884.549577][ T7689] loop5: p2 start 1256873442 is beyond EOD, truncated 06:43:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000000)={{{@in=@local, @in6=@empty}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000000100)=0xe8) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x43, 0x0, 0x1a02004, &(0x7f0000000340)={[], [{@fowner_lt={'fowner<'}}, {@fowner_eq={'fowner', 0x3d, r1}}, {@appraise_type='appraise_typeFimasig'}, {@smackfsroot={'smackfsroot', 0x3d, '\xe6vboxnet1@'}}]}) 06:43:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x7, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:27 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2}, 0x0) 06:43:27 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2, 0x2100}, &(0x7f0000000300)) 06:43:27 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:43:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x8, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 884.824080][ T7724] Dev loop5: unable to read RDB block 9 [ 884.831080][ T7724] loop5: AHDI p1 p2 p4 [ 884.840119][ T7724] loop5: partition table partially beyond EOD, truncated 06:43:27 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4}, 0x0) 06:43:27 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2, 0x3f00}, &(0x7f0000000300)) [ 884.876370][ T7724] loop5: p1 start 1362130174 is beyond EOD, truncated [ 884.907306][ T7724] loop5: p2 start 1256873442 is beyond EOD, truncated 06:43:27 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) [ 885.328810][ T7749] Dev loop5: unable to read RDB block 9 [ 885.382522][ T7749] loop5: AHDI p1 p2 p4 [ 885.386752][ T7749] loop5: partition table partially beyond EOD, truncated 06:43:28 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r1, 0x401c5820, &(0x7f0000000180)=0x18) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200040}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x14, r2, 0x1, 0x70bd26, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0xc4}, 0x40020010) r3 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r3, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r3, &(0x7f0000000180)={0x78}, 0x78) 06:43:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x9, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:28 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2, 0x2000000}, &(0x7f0000000300)) [ 885.511354][ T7749] loop5: p1 start 1362130174 is beyond EOD, truncated [ 885.555983][ T7749] loop5: p2 start 1256873442 is beyond EOD, truncated [ 885.674022][ T7749] Dev loop5: unable to read RDB block 9 [ 885.679737][ T7749] loop5: AHDI p1 p2 p4 [ 885.708666][ T7749] loop5: partition table partially beyond EOD, truncated 06:43:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imasig'}, {@hash='hash'}]}) 06:43:28 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xf}, 0x0) 06:43:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0xa, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:28 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2, 0x4000000}, &(0x7f0000000300)) [ 885.733251][ T7749] loop5: p1 start 1362130174 is beyond EOD, truncated [ 885.753474][ T7749] loop5: p2 start 1256873442 is beyond EOD, truncated 06:43:28 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:43:28 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x21}, 0x0) 06:43:28 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2, 0xf000000}, &(0x7f0000000300)) [ 885.980761][ T7767] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value 06:43:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0xb, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x2, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="666f986e65623c", @ANYRESDEC=0x0, @ANYBLOB="2c736d61636b66736861743de676626f786e657431402c61707072616973655f747970653d696d682c00"]) r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x3, 0x20000) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000040)={0x6, 0x1}) [ 886.187363][ T7788] Dev loop5: unable to read RDB block 9 [ 886.200030][ T7788] loop5: AHDI p1 p2 p4 [ 886.255622][ T7794] FAT-fs (loop3): Unrecognized mount option "fo˜neb<00000000000000000000" or missing value [ 886.276255][ T7788] loop5: partition table partially beyond EOD, truncated [ 886.347833][ T7788] loop5: p1 start 1362130174 is beyond EOD, truncated [ 886.362300][ T7788] loop5: p2 start 1256873442 is beyond EOD, truncated [ 886.568004][ T7788] Dev loop5: unable to read RDB block 9 [ 886.617000][ T7788] loop5: AHDI p1 p2 p4 [ 886.638437][ T7788] loop5: partition table partially beyond EOD, truncated [ 886.671025][ T7788] loop5: p1 start 1362130174 is beyond EOD, truncated [ 886.712343][ T7788] loop5: p2 start 1256873442 is beyond EOD, truncated 06:43:29 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f0000000040)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x4, {0x0, 0x0, 0x0, {0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee00, 0x0, 0x8}}}, 0x78) 06:43:29 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xf00}, 0x0) 06:43:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000100)='./file0\x00', 0xc) write$FUSE_DIRENT(r1, &(0x7f0000000140)={0x80, 0x8000000000000003, 0x4, [{0x6, 0xcc, 0x14, 0x1000, 'posix_acl_accessppp0'}, {0x2, 0xc25, 0x0, 0x7}, {0x6, 0x9, 0xc, 0x30, '/dev/capi20\x00'}]}, 0x80) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x0, 0x0) dup2(r0, r2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x4, 0xfd, 0x5, 0x4, 0x0, 0x82a, 0x8000, 0x8, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1f, 0x6, @perf_bp={&(0x7f0000000000), 0x1}, 0x820, 0x100000000, 0x4d, 0x2, 0x100, 0xffffff7f, 0x6}, 0x0, 0xe, r0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imasig'}, {@hash='hash'}]}) 06:43:29 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2, 0x21000000}, &(0x7f0000000300)) 06:43:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0xc, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:29 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:43:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0xd, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:29 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2100}, 0x0) [ 886.946347][ T7823] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value 06:43:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0xe, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:29 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2, 0x3f000000}, &(0x7f0000000300)) [ 887.072341][ T7830] Dev loop5: unable to read RDB block 9 06:43:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0xf, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="fd080a000000d5", @ANYRESDEC=0x0, @ANYBLOB="2c736d61636b66736861743de676626f786e657431402c61707072616973655f747970653d696d617369672c686173682c00f5183648eaaafd2d0181c4ce90c812d3e8f7acc3cd2b4176180451c4e266715b0a1e930053bb0d060c55a680f58a41c3fc"]) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x10000, 0x0) pipe2(&(0x7f0000000000), 0x0) [ 887.171648][ T7830] loop5: AHDI p1 p2 p4 [ 887.222472][ T7830] loop5: partition table partially beyond EOD, truncated [ 887.252600][ T7830] loop5: p1 start 1362130174 is beyond EOD, truncated [ 887.315013][ T7830] loop5: p2 start 1256873442 is beyond EOD, truncated [ 887.376597][ T7852] FAT-fs (loop3): Unrecognized mount option "ý [ 887.376597][ T7852] " or missing value 06:43:30 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) ioctl$KVM_SET_GUEST_DEBUG(r1, 0x4048ae9b, &(0x7f0000000040)={0x10000, 0x0, [0x7fff, 0xfffffffffffffffa, 0x3, 0x929, 0x481, 0x3, 0x9, 0x9]}) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78}, 0x78) 06:43:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, &(0x7f0000000180)=0x18) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f0000000100)=""/252) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="757466383d312c6e6f6e756d7461696c3d302c73686f72746e616d653d6c6f0765f5403ebb722c756e695f786c6174653d302c756e695f786c6174653d312c6e6e6f6e756d7461696c3d312c696f636861727365743d6d61636761656c69632c73686f72746e616d653d77696e39352c6572726f72733d72656d6f756e742d726f2c6e6f6e756d7461696c3d302c666f77", @ANYRESDEC=0x0, @ANYBLOB="2c738161636b66730261743de676626f786e657431402c61707072616973655f747970653d696d617369672c686173682c00"]) prctl$PR_SET_FPEXC(0xc, 0x100000) 06:43:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x10, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:30 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3f00}, 0x0) 06:43:30 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2, 0x200000000000000}, &(0x7f0000000300)) [ 887.555654][ T7830] Dev loop5: unable to read RDB block 9 [ 887.586252][ T7830] loop5: AHDI p1 p2 p4 [ 887.590513][ T7830] loop5: partition table partially beyond EOD, truncated [ 887.637627][ T7830] loop5: p1 start 1362130174 is beyond EOD, truncated [ 887.674905][ T7830] loop5: p2 start 1256873442 is beyond EOD, truncated 06:43:30 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:43:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x11, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 887.779278][ T7878] FAT-fs (loop3): Unrecognized mount option "shortname=loeõ@>»r" or missing value 06:43:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x12, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:30 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x15d4b87) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)=ANY=[@ANYBLOB="cc0000002312206a27bd7000fcdbdf2500000000a68e0b5e67636d286465732d67656e657269632900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000e000000010ac5880f738eb155ef415a25955a7ffff11928e05014b9715c137a3e0486ec72c001300fe8000000000000000000000000000aaff010000000000000000000000000001000000000a0000000c00100000000000000000000c00150059073500060000000800180004000000"], 0xcc}, 0x1, 0x0, 0x0, 0x10}, 0x2000) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, &(0x7f0000000180)=0x18) ioctl$KVM_CHECK_EXTENSION_VM(r0, 0xae03, 0x400) r2 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r3 = dup(r2) ioctl$SG_NEXT_CMD_LEN(r3, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r3, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0xff}}}, 0x78) 06:43:30 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2000000}, 0x0) [ 887.972343][ T7890] Dev loop5: unable to read RDB block 9 [ 888.009636][ T7890] loop5: AHDI p1 p2 p4 [ 888.014370][ T7890] loop5: partition table partially beyond EOD, truncated [ 888.022075][ T7890] loop5: p1 start 1362130174 is beyond EOD, truncated [ 888.029391][ T7890] loop5: p2 start 1256873442 is beyond EOD, truncated 06:43:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={[{@uni_xlate='uni_xlate=1'}, {@utf8='utf8=1'}, {@shortname_winnt='shortname=winnt'}, {@utf8='utf8=1'}, {@fat=@fmask={'fmask', 0x3d, 0x400}}, {@shortname_winnt='shortname=winnt'}, {@iocharset={'iocharset', 0x3d, 'cp861'}}, {@rodir='rodir'}, {@shortname_winnt='shortname=winnt'}], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imasig'}, {@hash='hash'}]}) 06:43:30 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2, 0x400000000000000}, &(0x7f0000000300)) 06:43:30 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4000000}, 0x0) [ 888.162268][ T7890] Dev loop5: unable to read RDB block 9 [ 888.198134][ T7890] loop5: AHDI p1 p2 p4 06:43:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x13, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 888.259741][ T7890] loop5: partition table partially beyond EOD, truncated 06:43:31 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2, 0xf00000000000000}, &(0x7f0000000300)) 06:43:31 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xf000000}, 0x0) 06:43:31 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78}, 0x78) r2 = pkey_alloc(0x0, 0x1) pkey_free(r2) [ 888.338519][ T7890] loop5: p1 start 1362130174 is beyond EOD, truncated [ 888.349472][ T7919] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value [ 888.377405][ T7890] loop5: p2 start 1256873442 is beyond EOD, truncated 06:43:31 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="ae02e0285451423020bf4bb1f233a32d034ce718517fcc6feba8e13da3f25b822c0caedef77480025ed03931ee0b25e16c7076dc14f2a83a792218e2b0b46859f6648e099db7873db886a5c2ec0af2826d2a73e5d79e78a2715eec7f36ebcb312e87f7daeb6e6ecce7f88fbeb7f8890e11d6b35f2e49df09ca6eebc2f0835a280ad84abbc9b3ed31e1438048ff5afe722d3ed3a1af7a6c3e7f07f4a4de58443e264fc6d7335bd326c747772daea7f42d3931f7c59a4749d5e442256b10b60b27f3275ff8c981b2a4af2c283fb1f40cde0ba30ee1fc087f1171c45758df7897fa1b2ac8495490210035d99bf4909d8c905b0260dbac903596c5c7839b193cf57c796bd3b69490f7bd0adfebdb296ecfa3cc994d1e7b76d5b694b00bb8d679376928697520adbcef9b513fcc92f216420ea95f9fc5e71fd22a982563cf9b4cec57ac66cc420d94c88569f5a715292bd8450735cff08fd4f684400190df78a309c02f3fefe507231903f56f4f2fccbd37fb5d54441029b822f4ceccc68adadfdd458ec5c89d2982343c0cd23039db490f92a3541b049763d04c66c08bca633fb681f0a757506766488271f7d3d8375ce360c3bc1ff3820b62875ad7521b34dce16e3ec439ad7219f0513074fe296b1cfa7fd5d05f4aea5de26fa70bd4e6c0934c0a11af974a066df40f61434a", 0x1eb, 0x3}]) 06:43:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imasig'}, {@hash='hash'}]}) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, &(0x7f0000000180)=0x18) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0xb}}}, 0x24) 06:43:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x14, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:31 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x21000000}, 0x0) 06:43:31 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2, 0x2100000000000000}, &(0x7f0000000300)) 06:43:31 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0xed142) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r2 = accept4(r1, &(0x7f0000001400)=@sco, &(0x7f0000001480)=0x80, 0x0) setsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f00000014c0)=@int=0x80000000, 0x4) r3 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r3, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r3, &(0x7f0000000180)={0x78}, 0x78) [ 888.802482][ T7952] Dev loop5: unable to read RDB block 9 [ 888.808229][ T7952] loop5: AHDI p1 p2 p4 [ 888.812677][ T7952] loop5: partition table partially beyond EOD, truncated [ 888.820347][ T7952] loop5: p1 start 1362130174 is beyond EOD, truncated [ 888.827468][ T7952] loop5: p2 start 1256873442 is beyond EOD, truncated 06:43:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x15, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 888.987554][ T7952] Dev loop5: unable to read RDB block 9 [ 888.993298][ T7952] loop5: AHDI p1 p2 p4 [ 889.002596][ T7952] loop5: partition table partially beyond EOD, truncated [ 889.009923][ T7952] loop5: p1 start 1362130174 is beyond EOD, truncated [ 889.032210][ T7952] loop5: p2 start 1256873442 is beyond EOD, truncated 06:43:31 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3f000000}, 0x0) 06:43:31 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:43:31 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x16, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:32 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_SET_COMMAND_Q(r0, 0x2271, &(0x7f0000000240)=0x1) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r2, 0x401c5820, &(0x7f0000000180)=0x18) ioctl$NBD_CLEAR_SOCK(r2, 0xab04) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r3, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r3, 0x401c5820, &(0x7f0000000180)=0x18) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000000040)={{&(0x7f0000ffc000/0x4000)=nil, 0x4000}, 0x7fd68e65390b6b28}) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r4, 0x401c5820, &(0x7f0000000180)=0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000100)={0xffffffffffffffff}, 0x0, 0xa}}, 0x20) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r6, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r6, 0x401c5820, &(0x7f0000000180)=0x18) ioctl$RTC_IRQP_READ(r6, 0x8008700b, &(0x7f0000000280)) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r4, &(0x7f0000000200)={0x10, 0x30, 0xfa00, {&(0x7f00000000c0), 0x4, {0xa, 0x4e23, 0x80000000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1}, r5}}, 0x38) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78}, 0x78) 06:43:32 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2, 0x3f00000000000000}, &(0x7f0000000300)) [ 889.183534][ T7939] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value [ 889.422380][ T7978] Dev loop5: unable to read RDB block 9 [ 889.447516][ T7978] loop5: AHDI p1 p2 p4 06:43:32 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x200000000000000}, 0x0) [ 889.476947][ T7978] loop5: partition table partially beyond EOD, truncated [ 889.520649][ T7978] loop5: p1 start 1362130174 is beyond EOD, truncated [ 889.532520][ T7978] loop5: p2 start 1256873442 is beyond EOD, truncated [ 889.653011][ T7978] Dev loop5: unable to read RDB block 9 [ 889.658646][ T7978] loop5: AHDI p1 p2 p4 [ 889.690038][ T7978] loop5: partition table partially beyond EOD, truncated 06:43:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x18, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:32 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2, 0x8000000000000000}, &(0x7f0000000300)) 06:43:32 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x400000000000000}, 0x0) 06:43:32 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, &(0x7f0000000180)=0x18) ioctl$TCXONC(r0, 0x540a, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800000000000000}, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x1fb, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imasig'}, {@hash='hash'}]}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.stat\x00', 0x0, 0x0) openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x101000, 0x0) [ 889.707221][ T7978] loop5: p1 start 1362130174 is beyond EOD, truncated [ 889.731358][ T7978] loop5: p2 start 1256873442 is beyond EOD, truncated 06:43:32 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:43:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x19, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:32 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) 06:43:32 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xf00000000000000}, 0x0) [ 890.003745][ T8020] Dev loop5: unable to read RDB block 9 [ 890.014204][ T8020] loop5: AHDI p1 p2 p4 [ 890.034714][ T8020] loop5: partition table partially beyond EOD, truncated 06:43:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x1b, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 890.051384][ T8020] loop5: p1 start 1362130174 is beyond EOD, truncated [ 890.059272][ T8020] loop5: p2 start 1256873442 is beyond EOD, truncated [ 890.301555][ T8020] Dev loop5: unable to read RDB block 9 [ 890.318631][ T8020] loop5: AHDI p1 p2 p4 06:43:33 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x0, 0x0) dup2(r2, r3) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000040)=0x2) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000080)='/dev/cachefiles\x00', 0x501000, 0x0) getsockopt$inet_mreq(r4, 0x0, 0x23, &(0x7f0000000100)={@rand_addr, @local}, &(0x7f0000000140)=0x8) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78}, 0x78) r5 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x0, 0x0) dup2(r5, r6) perf_event_open$cgroup(&(0x7f0000000200)={0x4, 0x70, 0x7f, 0x7, 0x2, 0xfb, 0x0, 0x4, 0x80010, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x80, 0x1}, 0x8, 0x5, 0x2, 0x0, 0x0, 0x1e, 0x401}, r1, 0xc, r5, 0x0) 06:43:33 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2, 0x0, 0x2}, &(0x7f0000000300)) 06:43:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x1c, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:33 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x2100000000000000}, 0x0) [ 890.388694][ T8020] loop5: partition table partially beyond EOD, truncated 06:43:33 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2, 0x0, 0x4}, &(0x7f0000000300)) 06:43:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x1d, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 890.438996][ T8020] loop5: p1 start 1362130174 is beyond EOD, truncated [ 890.469815][ T8020] loop5: p2 start 1256873442 is beyond EOD, truncated 06:43:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imasig'}, {@hash='hash'}]}) 06:43:33 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3f00000000000000}, 0x0) 06:43:33 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:43:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x1e, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:33 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) getsockopt$TIPC_CONN_TIMEOUT(r1, 0x10f, 0x82, &(0x7f0000000040), &(0x7f0000000080)=0x4) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78}, 0x78) 06:43:33 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2, 0x0, 0xf}, &(0x7f0000000300)) 06:43:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-%imd\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:33 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) syslog(0x8d420b6c, &(0x7f0000000040)=""/88, 0x58) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78}, 0x78) [ 891.059912][ T8081] Dev loop5: unable to read RDB block 9 06:43:33 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2, 0x0, 0x21}, &(0x7f0000000300)) [ 891.128160][ T8081] loop5: AHDI p1 p2 p4 06:43:33 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x8000000000000000}, 0x0) 06:43:34 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r2, 0x401c5820, &(0x7f0000000180)=0x18) ioctl$SCSI_IOCTL_STOP_UNIT(r2, 0x6) [ 891.211647][ T8081] loop5: partition table partially beyond EOD, truncated [ 891.263925][ T8094] could not allocate digest TFM handle poly1305-%imd 06:43:34 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2}, 0x0) [ 891.372515][ T8081] loop5: p1 start 1362130174 is beyond EOD, truncated [ 891.379951][ T8081] loop5: p2 start 1256873442 is beyond EOD, truncated [ 891.490562][ T8097] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value [ 891.513745][ T8081] Dev loop5: unable to read RDB block 9 [ 891.520741][ T8081] loop5: AHDI p1 p2 p4 [ 891.530884][ T8081] loop5: partition table partially beyond EOD, truncated [ 891.546543][ T8081] loop5: p1 start 1362130174 is beyond EOD, truncated [ 891.561633][ T8081] loop5: p2 start 1256873442 is beyond EOD, truncated 06:43:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imasig'}, {@hash='hash'}]}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = accept(0xffffffffffffffff, &(0x7f00000039c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, &(0x7f0000000900)=0x80) ioctl$sock_ax25_SIOCADDRT(r1, 0x890b, &(0x7f0000003a40)={@bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x3, [@bcast, @null, @null, @default, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @bcast]}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) r3 = syz_open_dev$admmidi(&(0x7f0000000200)='/dev/admmidi#\x00', 0x7, 0x90200) ioctl$ASHMEM_PURGE_ALL_CACHES(r3, 0x770a, 0x0) setuid(r2) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x40, 0x2, &(0x7f0000000180)=[{&(0x7f0000000080)="83e74a46f2b333f283dd4e9d61ba4379e026582a8a97a04358e0691791efda1de38e819be21ea826dd86404c38c1b922f89107f3d6598dab2938467e881397052ba3ad041d6942b8ee71ba9af7ef1badc4b03380ffd609abfc8d37cfb1d5c63537507064b1e5703f88f7b4b55ac1307dad6df0e1e63e2d8ce4b6fc92d4a8736ac2b36c3ca8c4d85dbe88a6b89500fb0183401dacf9d2099b8f74b0d9d994d808a3c7bbd94f8a5b3749da07c45bee9e899e9e6504", 0xb4, 0x800}, {&(0x7f0000000140)="044115db3c19ef206c0e1a0a1e0a33b446fb38000bb316f6497be3687133317e7215804bdcd1fc8cc51a89", 0x2b, 0x400}], 0x80020, &(0x7f00000001c0)={[{@noquota='noquota'}, {@grpid='grpid'}], [{@permit_directio='permit_directio'}, {@fowner_eq={'fowner', 0x3d, r2}}]}) 06:43:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-s%md\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:34 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2, 0x0, 0xf00}, &(0x7f0000000300)) 06:43:34 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4}, 0x0) 06:43:34 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) [ 891.949627][ T8135] Dev loop5: unable to read RDB block 9 [ 891.973740][ T8135] loop5: AHDI p1 p2 p4 [ 891.998003][ T8135] loop5: partition table partially beyond EOD, truncated 06:43:34 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xf}, 0x0) 06:43:34 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2, 0x0, 0x2100}, &(0x7f0000000300)) 06:43:34 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x10) ioctl$SG_NEXT_CMD_LEN(r2, 0x2283, &(0x7f00000000c0)=0x7b) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78}, 0x78) [ 892.038973][ T8139] could not allocate digest TFM handle poly1305-s%md [ 892.046150][ T8135] loop5: p1 start 1362130174 is beyond EOD, truncated [ 892.063082][ T8135] loop5: p2 start 1256873442 is beyond EOD, truncated 06:43:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-sim%\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 892.293172][ T8135] Dev loop5: unable to read RDB block 9 [ 892.298807][ T8135] loop5: AHDI p1 p2 p4 [ 892.319430][ T8143] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value [ 892.338831][ T8135] loop5: partition table partially beyond EOD, truncated [ 892.352316][ T8135] loop5: p1 start 1362130174 is beyond EOD, truncated [ 892.359348][ T8135] loop5: p2 start 1256873442 is beyond EOD, truncated 06:43:35 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2, 0x0, 0x3f00}, &(0x7f0000000300)) [ 892.388553][ T8156] could not allocate digest TFM handle poly1305-sim% 06:43:35 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x21}, 0x0) 06:43:35 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:43:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imasig'}, {@hash='hash'}]}) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x15d4b87) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r1, 0x401c5820, &(0x7f0000000180)=0x18) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r1, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r2, 0x100, 0x70bd2b, 0x25dfdbfe, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8141}, 0x4) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, &(0x7f0000000180)=0x18) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f00000000c0)=@gcm_256={{0x303}, "76bb041fffb7a9c1", "fd73f8896855d091b83476b59b33bc1e8eeb34693a64a0b832aa969efd306d04", "c69e8c18", "37ea781d26a90a52"}, 0x38) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000040)=0x4) 06:43:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 892.671308][ T8184] Dev loop5: unable to read RDB block 9 06:43:35 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x0, 0x0) dup2(r2, r3) write$binfmt_elf32(r3, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x6, 0x3, 0x1f, 0x9, 0x3, 0x3, 0x0, 0x43, 0x38, 0x249, 0x8, 0x0, 0x20, 0x2, 0x6, 0x8000, 0x6}, [{0x6474e551, 0x6, 0x0, 0xffff95ba, 0xfff, 0x13107994, 0x3, 0x3}, {0xec12b6d832924130, 0x7bb, 0xfffffeff, 0x5, 0x80000000, 0x8, 0x6c, 0x2}], "9d0d4734fccdf7ddf00a9d60b7ef2c2837f1843415a75cfc24ce46b499cd4b1c1a341a566f1ec2f9f197fe8ff18f0e75b5438bb9c9b4aa2b2897e435162db1d590df4a7060de99788f74e41e5781316a763abd59ddbc9d93914bf9d9e4f2e2f42e1bed9e15b68e7e42673cf25d469bc88bbb0c88b371c6abd024eafc99db6c214e1fec29aa31c981c8e359292e9461922e4994c56da8378a3780ff70f699d69ecf2a5b1170f1ff1be5465995e5532df28eb39331b8d58066852482e9fc91e721635f99ea87e1cc1ca752699159e84ce7f59ddf0313", [[], [], [], [], []]}, 0x64d) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78}, 0x78) [ 892.741045][ T8184] loop5: AHDI p1 p2 p4 06:43:35 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2, 0x0, 0x2000000}, &(0x7f0000000300)) 06:43:35 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xf00}, 0x0) [ 892.832446][ T8184] loop5: partition table partially beyond EOD, truncated 06:43:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00\x02\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:35 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78}, 0x78) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x0, 0x0) dup2(r2, r3) setsockopt$netlink_NETLINK_PKTINFO(r1, 0x10e, 0x3, &(0x7f0000000140)=0xfff, 0x4) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r4, 0x401c5820, &(0x7f0000000180)=0x18) ioctl$KDGETKEYCODE(r4, 0x4b4c, &(0x7f0000000100)={0x1f, 0x7fff}) read(r3, &(0x7f0000000040)=""/96, 0x60) [ 892.940627][ T8184] loop5: p1 start 1362130174 is beyond EOD, truncated [ 892.996978][ T8184] loop5: p2 start 1256873442 is beyond EOD, truncated [ 893.150482][ T8180] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value [ 893.173827][ T8184] Dev loop5: unable to read RDB block 9 [ 893.188119][ T8184] loop5: AHDI p1 p2 p4 06:43:36 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2, 0x0, 0x4000000}, &(0x7f0000000300)) 06:43:36 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2100}, 0x0) 06:43:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00\x03\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:36 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, &(0x7f0000000180)=0x18) r1 = openat(r0, &(0x7f0000000140)='./file0\x00', 0x184000, 0x91) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r3, 0x42b, 0x0, 0x0, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'caif0\x00'}}}}}, 0x34}}, 0x0) r4 = syz_open_dev$sndmidi(&(0x7f0000000340)='/dev/snd/midiC#D#\x00', 0x7, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r4, 0x810c5701, &(0x7f0000000380)) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x9433628a1ad85603}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x28, r3, 0x2, 0x70bd29, 0x25dfdbfb, {{}, 0x0, 0xb, 0x0, {0xc, 0x14, 'syz0\x00'}}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0xd88e}, 0x44) r5 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r6 = dup(r5) ioctl$SG_NEXT_CMD_LEN(r6, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r6, &(0x7f0000000180)={0x78}, 0x78) [ 893.217545][ T8184] loop5: partition table partially beyond EOD, truncated [ 893.232630][ T8184] loop5: p1 start 1362130174 is beyond EOD, truncated [ 893.254594][ T8184] loop5: p2 start 1256873442 is beyond EOD, truncated 06:43:36 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="ae02e0285451423020bf4bb1f233a32d034ce718517fcc6feba8e13da3f25b822c0caedef77480025ed03931ee0b25e16c7076dc14f2a83a792218e2b0b46859f66d8e099db7873db886a5c2ec0af2826d2a73e5d79e78a2715eec7f36ebcb312e87f7daeb6e6ecce7f88fbeb7f8890e11d6b35f2e49df09ca6eebc2f0835a280ad84abbc9b3ed31e1438048ff5afe722d3ed3a1af7a6c3e7f07f4a4de58443e264fc6d7335bd326c747772daea7f42d3931f7c59a4749d5e442256b10b60b27f3275ff8c981b2a4af2c283fb1f40cde0ba30ee1fc087f1171c45758df7897fa1b2ac8495490210035d99bf4909d8c905b0260dbac903596c5c7839b193cf57c796bd3b69490f7bd0adfebdb296ecfa3cc994d1e7b76d5b694b00bb8d679376928697520adbcef9b513fcc92f216420ea95f9fc5e71fd22a982563cf9b4cec57ac66cc420d94c88569f5a715292bd8450735cff08fd4f684400190df78a309c02f3fefe507231903f56f4f2fccbd37fb5d54441029b822f4ceccc68adadfdd458ec5c89d2982343c0cd23039db490f92a3541b049763d04c66c08bca633fb681f0a757506766488271f7d3d8375ce360c3bc1ff3820b62875ad7521b34dce16e3ec439ad7219f0513074fe296b1cfa7fd5d05f4aea5de26fa70bd4e6c0934c0a11af974a066df40f61434a", 0x1eb, 0x3}]) [ 893.413752][ T8180] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value 06:43:36 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3f00}, 0x0) 06:43:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x3, 0x2) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r1, 0x401c5820, &(0x7f0000000180)=0x18) r2 = socket(0x11, 0x801, 0x0) fsetxattr(r2, &(0x7f0000000100)=@random={'trusted.', 'vboxnet0)\x00'}, &(0x7f00000001c0)='cpuacct.usage_percpu_sys\x00', 0x19, 0x77c7d10c2f7e2ec7) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2ac5000000012e0b3836005404b0e0301a060075f2e3ff5f163ee340b700000080000000000000fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c65400"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="380000002400e50d00"/20, @ANYRES32=r3, @ANYBLOB="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"], 0x3}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r4, 0x401c5820, &(0x7f0000000180)=0x18) ioctl$KDSKBLED(r4, 0x4b65, 0x1ff) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000040)={0x87, @local, 0x4e22, 0x4, 'rr\x00', 0xf, 0xfffffc00, 0x3a}, 0x2c) socket$inet6_udp(0xa, 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r5, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r5, 0x401c5820, &(0x7f0000000180)=0x18) ioctl$KVM_GET_ONE_REG(r5, 0x4010aeab, &(0x7f0000000080)={0x7, 0x8}) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000200)={0x20, 0xc, 0x4, 0x20000, {0x0, 0x2710}, {0x4, 0x0, 0x7, 0x2, 0x3, 0x4, "1c360cb4"}, 0xfffffffe, 0x4, @offset=0xfffff801, 0x4}) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imasig'}, {@hash='hash'}]}) 06:43:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:36 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2, 0x0, 0xf000000}, &(0x7f0000000300)) 06:43:36 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2000000}, 0x0) [ 893.654841][ T8248] tipc: Started in network mode [ 893.660005][ T8248] tipc: Own node identity , cluster identity 4711 [ 893.673678][ T8248] tipc: Failed to obtain node identity [ 893.679422][ T8248] tipc: Enabling of bearer rejected, failed to enable media [ 893.752215][ T8242] Dev loop5: unable to read RDB block 9 [ 893.762342][ T8242] loop5: AHDI p1 p2 p4 [ 893.766540][ T8242] loop5: partition table partially beyond EOD, truncated 06:43:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 893.851357][ T8242] loop5: p1 start 1362130174 is beyond EOD, truncated [ 893.879666][ T8242] loop5: p2 start 1256873442 is beyond EOD, truncated 06:43:36 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x4000000}, 0x0) 06:43:36 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2, 0x0, 0x21000000}, &(0x7f0000000300)) 06:43:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 894.087629][ T8263] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value [ 894.109820][ T8242] Dev loop5: unable to read RDB block 9 [ 894.122569][ T8242] loop5: AHDI p1 p2 p4 [ 894.141914][ T8242] loop5: partition table partially beyond EOD, truncated [ 894.172810][ T8242] loop5: p1 start 1362130174 is beyond EOD, truncated 06:43:37 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xf000000}, 0x0) [ 894.192421][ T8242] loop5: p2 start 1256873442 is beyond EOD, truncated [ 894.223876][ T8248] tipc: Started in network mode [ 894.256157][ T8248] tipc: Own node identity , cluster identity 4711 [ 894.307009][ T8248] tipc: Failed to obtain node identity [ 894.319329][ T8248] tipc: Enabling of bearer rejected, failed to enable media 06:43:37 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x0, 0x0) dup2(r1, r2) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r2, 0x10000, 0x0, 0xa2, 0x400}) r3 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r3, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r3, &(0x7f0000000180)={0x78}, 0x78) 06:43:37 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2, 0x0, 0x3f000000}, &(0x7f0000000300)) 06:43:37 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="ae02e0285451423020bf4bb1f233a32d034ce718517fcc6feba8e13da3f25b822c0caedef77480025ed03931ee0b25e16c7076dc14f2a83a792218e2b0b46859f6728e099db7873db886a5c2ec0af2826d2a73e5d79e78a2715eec7f36ebcb312e87f7daeb6e6ecce7f88fbeb7f8890e11d6b35f2e49df09ca6eebc2f0835a280ad84abbc9b3ed31e1438048ff5afe722d3ed3a1af7a6c3e7f07f4a4de58443e264fc6d7335bd326c747772daea7f42d3931f7c59a4749d5e442256b10b60b27f3275ff8c981b2a4af2c283fb1f40cde0ba30ee1fc087f1171c45758df7897fa1b2ac8495490210035d99bf4909d8c905b0260dbac903596c5c7839b193cf57c796bd3b69490f7bd0adfebdb296ecfa3cc994d1e7b76d5b694b00bb8d679376928697520adbcef9b513fcc92f216420ea95f9fc5e71fd22a982563cf9b4cec57ac66cc420d94c88569f5a715292bd8450735cff08fd4f684400190df78a309c02f3fefe507231903f56f4f2fccbd37fb5d54441029b822f4ceccc68adadfdd458ec5c89d2982343c0cd23039db490f92a3541b049763d04c66c08bca633fb681f0a757506766488271f7d3d8375ce360c3bc1ff3820b62875ad7521b34dce16e3ec439ad7219f0513074fe296b1cfa7fd5d05f4aea5de26fa70bd4e6c0934c0a11af974a066df40f61434a", 0x1eb, 0x3}]) 06:43:37 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) r1 = getpid() process_vm_writev(r1, &(0x7f0000000480)=[{&(0x7f0000000180)=""/182, 0xb6}, {&(0x7f0000000080)=""/11, 0xb}, {&(0x7f0000000240)=""/127, 0x7f}, {&(0x7f0000000500)=""/34, 0x20}, {&(0x7f00000002c0)=""/60, 0x3c}, {&(0x7f0000000300)=""/201, 0xc9}], 0x6, &(0x7f0000000940)=[{&(0x7f0000000580)=""/127, 0x7f}, {&(0x7f0000000600)=""/83, 0x53}, {&(0x7f0000000400)=""/62, 0x3e}, {&(0x7f0000000680)=""/87, 0xac}, {&(0x7f0000000700)=""/117, 0xfffffee0}, {&(0x7f0000000780)=""/151, 0x97}, {&(0x7f0000000840)=""/220, 0xdc}], 0x7, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x41}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x8000}, r1, 0x3, r0, 0x0) r2 = syz_open_dev$ndb(&(0x7f0000000080)='/dev/nbd#\x00', 0x0, 0x0) r3 = socket(0x2, 0x1, 0x0) ioctl$NBD_SET_SOCK(r2, 0xab00, r3) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x12200, 0x0) ioctl$GIO_FONT(r4, 0x4b60, &(0x7f0000000040)=""/23) ioctl$NBD_DO_IT(r2, 0xab03) syz_mount_image$bfs(&(0x7f0000000100)='bfs\x00', &(0x7f0000000140)='./file0\x00', 0x89, 0x5, &(0x7f0000000b80)=[{&(0x7f00000009c0)="186d83252e870bb74b00aa942f5bfe5e853529cf12fbf9258ffe840036630a3c3f3b7854482297667669b8e20fdb008dfb35df74b88844854b21543ea20c026322a35c557bf5fd6f518e270711c46daf139a6f8a4283062ce7084bf38063e172f438aceb65cefe7e5b8a5683cb1dfaf93bfca72cac7cf713192ee705151dce50d5e5cf3aa9de48780401da0af854c1a31ae3c64c14cd623f738a7052adb6444457a7c5ef3eb593302a9799dafba91b70c8e381438ecd4c9af94d8e9059f8867f2b20cfe204eae0784ef0755af303d9fce22bf38aa1fed6d3173648f559753f73e7d763", 0xe3, 0x200}, {&(0x7f0000000ac0)="37ff6d21eb03d6c829b93856c392f9dee4cf9c55a60622e6447d3440a4f025f0e2b2b44b37203c396190cae9320ebb1ae84a7f9ba65bff65918074546db51e17ecd31d237f154c857d7513f893038e12249dc91e9dcfe98da2484ea2154ab1e052ab9f", 0x63, 0x7}, {&(0x7f0000000440)}, {&(0x7f0000000540)="c029edc3379484b59873fe0c8241b263ad1ec2bcc43b", 0x16, 0x14abb127}, {&(0x7f0000000b40)="09de3af902fbca3b9b463d02b31797", 0xf, 0x4}], 0x800400, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x200000, &(0x7f0000000940)=ANY=[]) 06:43:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00\a\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:37 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x21000000}, 0x0) [ 894.683512][ T8305] Dev loop5: unable to read RDB block 9 [ 894.689366][ T8305] loop5: AHDI p1 p2 p4 [ 894.702424][ T8305] loop5: partition table partially beyond EOD, truncated [ 894.710155][ T8305] loop5: p1 start 1362130174 is beyond EOD, truncated 06:43:37 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, &(0x7f0000000180)=0x18) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x40, &(0x7f0000000100)={'mangle\x00'}, &(0x7f0000000200)=0x54) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x2000, 0x0) io_setup(0x9, &(0x7f0000000240)=0x0) perf_event_open(&(0x7f000001d000)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000008c0), 0x4}, 0x0, 0xdc3, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$unix(0x1, 0x0, 0x0) io_cancel(r2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x15d4b87) r5 = socket(0x9, 0x80000, 0x6) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x0, 0x0) dup2(r6, r7) r8 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000680)='/\x00', 0x200000, 0x0) r9 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r10 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x0, 0x0) dup2(r9, r10) r11 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r12 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x0, 0x0) dup2(r11, r12) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r13, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r13, 0x401c5820, &(0x7f0000000180)=0x18) getsockopt$sock_cred(r13, 0x1, 0x11, &(0x7f00000006c0)={0x0}, &(0x7f0000000700)=0xc) r15 = getuid() getresgid(&(0x7f0000000740), &(0x7f0000000780), &(0x7f00000007c0)=0x0) r17 = syz_init_net_socket$x25(0x9, 0x5, 0x0) sendmsg$unix(r1, &(0x7f0000000880)={&(0x7f0000000340)=@file={0x2, './file0\x00'}, 0x6e, &(0x7f0000000280)=[{&(0x7f00000003c0)="f05c3d8622976cb44f148f72817dc6f33bd7a4c7357e1e1e1ab0fdcf4644bb1ae6c9fa802446335fefb368e9eba8e110df4bfadd1fcc615090855a2682ffcb7475d571deac85e032f87a0709363bde2703bab8cd9bc9b9c97062630aa74df3b308116468cde2fc9508c564219a2c426fc6c1fc1c281af4671b537b0ff59f0c4ac8a5c38438fffad502c11718ecfd4f81f512ce72da4f47748fc364770d0b0206b3bc2b141b38", 0xa6}, {&(0x7f0000000480)="a9f799eaada995eff972ba0f6159a9eff66e06baad5bc22c9d9098537fb1cc12dac15e637b7292f64352a080bff73d8bcf31a1eff02fe9f621aa41d3f05b9eb32f24602ec8d8fc090555ac93ee685a0c8731670807907540d180be06df1315e04432727129373000d9ee4d1df3da82418531d900bcded4a2aa437022f69ae9c265626cf04603b8b55a604d9a20b32a6b5717837e9aa3e9b86e24f0a07e276927a25834a6f1bff5d10c72944a938559facb689b7abad4c44a4f20330cef148b40ac3178ee88a532a24763ef61afb998e20c078cef721a16325ae8b6d352c8f8cfe264f60497562a", 0xe7}, {&(0x7f0000000580)="945e8e046728c6fc4d525db7eee8314b050ed3e93a04dfb226d96574287e3c232945642509e2ca81fd074d2e3c64e52073862790cd22196639f4819f1719091c39bbb5f1daa8205e8c78410a1454e8357e366c1368686b76891a5ed12d10bf7f05bbfafe4fbbcaeecc6a5ff3bfca6402d8f90c02da7e056f781145c1d849d29396a08dde6a713177ecb1ab9510e245b94ba9b6ffd734fd3b89da0f1441b7196d9daa7fe8cf70d3aaf3fac3f524dcf269b05abae14f1078706bb9a076551379eaf39161bf914ec1cd8d0a6598af520f93952cb748d56d893ee91941ad0f9b", 0xde}], 0x3, &(0x7f0000000900)=ANY=[@ANYBLOB="30000000000000000100000001000000", @ANYRES32=r5, @ANYRES32=r7, @ANYRES32=r8, @ANYRES32=r9, @ANYRES32=r3, @ANYRES32=r12, @ANYRES32=r3, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=r14, @ANYRES32=r15, @ANYRES32=r16, @ANYBLOB="0000000014000000000000000100000001000000", @ANYRES32=r17, @ANYBLOB="00000000fc59d643c0ff4e8772444cc5f17ac1dbfc2b6921af9efc281c599454"], 0x68, 0x400a018}, 0x800) ioctl$EXT4_IOC_SETFLAGS(r4, 0x401c5820, &(0x7f0000000180)=0x18) ioctl$EVIOCGNAME(r4, 0x80404506, &(0x7f0000000000)=""/99) [ 894.787882][ T8305] loop5: p2 start 1256873442 is beyond EOD, truncated 06:43:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00\b\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 894.872934][ T8317] block nbd3: Receive control failed (result -107) 06:43:37 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:43:37 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3f000000}, 0x0) [ 895.042346][ T8321] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=00000000) [ 895.114798][ T8312] block nbd3: shutting down sockets 06:43:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00\t\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 895.291308][ T8319] block nbd3: Receive control failed (result -107) [ 895.317579][ T8312] block nbd3: shutting down sockets 06:43:38 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x200000000000000}, 0x0) [ 895.347365][ T8338] Dev loop5: unable to read RDB block 9 [ 895.377604][ T8338] loop5: AHDI p1 p2 p4 [ 895.408667][ T8338] loop5: partition table partially beyond EOD, truncated [ 895.419518][ T8321] BFS-fs: bfs_fill_super(): No BFS filesystem on loop3 (magic=00000000) 06:43:38 executing program 4: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, 'sit0\x00', 0x1}, 0x10a) ioctl(r0, 0x8916, &(0x7f0000000000)) ioctl(r0, 0x80000000008936, &(0x7f0000000000)) r1 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r2 = dup(r1) ioctl$SG_NEXT_CMD_LEN(r2, 0x2283, &(0x7f00000002c0)=0x2f) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_GET(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1010}, 0xc, &(0x7f00000000c0)={&(0x7f0000000300)={0x2a4, r5, 0x0, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0x150, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x1d8db61f, @local, 0x2d7e}}, {0x14, 0x2, @in={0x2, 0x4e22, @multicast1}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @multicast2}}, {0x14, 0x2, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xf}}}}}, @TIPC_NLA_BEARER_PROP={0x44, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x35a8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x81}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x7, @ipv4={[], [], @multicast2}, 0x7}}, {0x14, 0x2, @in={0x2, 0x4e24, @empty}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0xffff, @empty, 0x9}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x4, @mcast2, 0x1}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x48}]}, @TIPC_NLA_NODE={0x1c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}]}, @TIPC_NLA_NET={0x48, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xbaf}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x401}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x800}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x2}, @TIPC_NLA_NET_NODEID_W1={0xc}]}, @TIPC_NLA_LINK={0x64, 0x4, [@TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfffffff9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}]}, @TIPC_NLA_LINK={0x3c, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x96}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffff80}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}]}]}, @TIPC_NLA_BEARER={0x3c, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @multicast2}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x185, @local, 0xfffffffb}}}}]}]}, 0x2a4}, 0x1, 0x0, 0x0, 0x5840}, 0x4000000) setuid(r4) write$FUSE_ATTR(r2, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, r4, 0x0, 0x0, 0x800000}}}, 0x78) [ 895.450614][ T8338] loop5: p1 start 1362130174 is beyond EOD, truncated [ 895.499532][ T8338] loop5: p2 start 1256873442 is beyond EOD, truncated 06:43:38 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x0, 0x0) dup2(r1, r2) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYPTR64=&(0x7f0000000600)=ANY=[@ANYPTR64, @ANYRESHEX=0x0, @ANYBLOB="cbb074b9cfcaa26585bfdefc5f00a91e44fbc803959645d152fd159e6e04781c2a211fa08fa3e0a9f945bfb625b60e9270d1b957bb002e4ebd7b971b8de6dd8f63faa1c8a80ec2203df6073b19906d94ee8c477191e31134c9a8fe87155c130dfccbc5d7d53fbffcdd3c6c47f98b880338420ede25d2623f026109add1c8652a97141d137dfff51b0c4474051b904e275687730c17777c1b04242fd70eb4c76156c0", @ANYRESHEX=0x0, @ANYRESDEC=r0, @ANYRESOCT, @ANYBLOB="bcdd2df4399dcdea39dc9ac10ac47e129d8383d082eaa7bbf1b2ccd9ed400e57392dd7c13066b51aade94c90969b8375d4b16e7db801deccac88d68ef4c6f986d728dc2fd1e47c52c4af091994a4c2c4cc4e8f27ceac4994bc08d9aff8d0bc3c6d68b14881ee33f311aaa5ed1826ac33149a8ac799e61d58", @ANYRESHEX=r0, @ANYRESDEC, @ANYRES16=0x0], @ANYRESDEC=0x0, @ANYRES32=r1]) 06:43:38 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x400000000000000}, 0x0) 06:43:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00\n\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:38 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x1000000000000000, {0x0, 0x0, 0x0, {0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1f}}}, 0x78) ioctl$VIDIOC_S_HW_FREQ_SEEK(r1, 0x40305652, &(0x7f0000000040)={0x2000000, 0xc, 0x7e2d, 0x0, 0x6, 0xda44, 0x4}) [ 895.703071][ T8338] Dev loop5: unable to read RDB block 9 [ 895.708708][ T8338] loop5: AHDI p1 p2 p4 [ 895.784253][ T8338] loop5: partition table partially beyond EOD, truncated 06:43:38 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xf00000000000000}, 0x0) [ 895.846850][ T8338] loop5: p1 start 1362130174 is beyond EOD, truncated [ 895.864504][ T8338] loop5: p2 start 1256873442 is beyond EOD, truncated 06:43:38 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_GET_TIMERSLACK(0x1e) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) 06:43:38 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x400040) openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x8000, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) write$binfmt_aout(r1, &(0x7f0000000400)={{0x107, 0x7f, 0x4, 0x283, 0xb2, 0x0, 0x274, 0xd2a3}, "128cd4080a4b72afc406a919d374ebf2fbbce54e05f8763e57968fec1e0373ea31458a42e2cada80b37b610cc78b03a054fa91143128295712ac6fc3b594dc4c2b72efc7086aa61f8854d57ad51f133097c0b681e2a074a45e140f1fc71d7be1a7ebf885063d42a96471850c88546b8bb9920129132da4fb25ecfc08a54f8a9d4703b925d549db9c77be6e557a6974b10481b062f9263b0fdfb6fe7eeb2232dec160377b042697b49810ecf9957c72fbeb353cc252a4882033ea219a5d1d2049f67d00834767e67c51e18bc2ce", [[], []]}, 0x2ed) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r2, 0x401c5820, &(0x7f0000000180)=0x18) r3 = openat$cgroup_ro(r2, &(0x7f0000000300)='cpuse^beffectifeWcpus\x00\x9a\x00\xe0x\\\xda\xb1\xbf\x18\xef\xe6?\x9f\x99k\x88N5\xff\xc5\a\xb7\x13?\x03\xc7\xf7_\xc6F\xfa\xb5v\xbc\x13\xfc\x1d\xd5`\x8f*\xb70\xc9\xa1\vMg\x93\xe9%\x9b\xb895\x1d\xcf\x16\x0ero\xe36\xb7\xc1L)RR\r\x92\xc3\xba\x00\x00\x04\xf0\xf9P.\x8f\xb5\xec]\xf7d\x11\xaf\xd0f;\xd3\x16:\x17\xc5|k\xb1\x9dfM\x99Lw\x8f\x7fJ\x12;\xa8*\xef\x8fNv\xb6\x9b\xa0\xd5c\x87\xb9\xf8r\xafx\xb9\xc9a/M\xafPa\x86\x7f\x8a\xe8\x0e\a\x00\xe1\xaa\x1dd.!pK\xc1pM\x05\xd1\x96\x8ev\x8a\x83\xb0\xaf\xf7\x96\xd9=\x90\xb5\x1fqb\xc7\xc3\xac\f\a\x8d|}\x14\x1b,&\x00\x00\x00\x00.\xf7fV\x9aP\xf7Y\x14\x00\x00', 0x26e1, 0x0) write$cgroup_int(r3, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r3, 0x401c5820, &(0x7f0000000180)=0x18) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r3, 0x29, 0x41, &(0x7f0000000100)=ANY=[@ANYBLOB="66696c74657a000000000000000000000000000004000000000000000000000088f1dd6adb9d66f4cf4a2500000000000000000000000000000000000000fd0000000000000000000000000000000000000000000000000000000000000000000000a9089c287276d0095351e9e800"/122], 0x68) r4 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r4, &(0x7f0000000180)={0xffffff10, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0xffffffff}}}, 0x78) 06:43:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00\v\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:38 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:43:38 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2100000000000000}, 0x0) [ 896.158241][ T8377] FAT-fs (loop3): bogus number of reserved sectors [ 896.168051][ T8377] FAT-fs (loop3): Can't find a valid FAT filesystem [ 896.285824][ T8395] FAT-fs (loop3): bogus number of reserved sectors [ 896.341434][ T8395] FAT-fs (loop3): Can't find a valid FAT filesystem [ 896.349242][ T8399] Dev loop5: unable to read RDB block 9 [ 896.364237][ T8399] loop5: AHDI p1 p2 p4 [ 896.397658][ T8399] loop5: partition table partially beyond EOD, truncated [ 896.405387][ T8399] loop5: p1 start 1362130174 is beyond EOD, truncated [ 896.412688][ T8399] loop5: p2 start 1256873442 is beyond EOD, truncated 06:43:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x00\x00\x00\x00\x00\x00\f\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:39 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x3f00000000000000}, 0x0) 06:43:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r1, 0x401c5820, &(0x7f0000000180)=0x18) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000), 0x106, 0x5}}, 0x20) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r2) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='utf8=1,nnonumtail=1,shortname=mixed,rodir,fowner<', @ANYRESDEC=0x0, @ANYBLOB="2c666f776e65723d769fe551ef0b1b64f20f4b4694a81a2793e4611f26446f2a236066d91eee94d85de4d9fdcdc56714b378f69808de8813a8d9cc34bb42985ac1610779290e1f0fd1a0fb3ef610ce5f73d371e568bb78ec000e58a3b34e06845e8c6326f3cf06e45d38bdfc0ce33a055c0deeddba", @ANYRESDEC=r2, @ANYBLOB=',appraise_type=kmasig,hash,\x00']) [ 896.722793][ T8399] Dev loop5: unable to read RDB block 9 [ 896.740018][ T8399] loop5: AHDI p1 p2 p4 06:43:39 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) [ 896.772272][ T8399] loop5: partition table partially beyond EOD, truncated 06:43:39 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8000000000000000}, 0x0) [ 896.812687][ T8399] loop5: p1 start 1362130174 is beyond EOD, truncated [ 896.831411][ T8399] loop5: p2 start 1256873442 is beyond EOD, truncated 06:43:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x02\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:39 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="ae02e0285451423020bf4bb1f233a32d034ce718517fcc6feba8e13da3f25b822c0caedef77480025ed03931ee0b25e16c7076dc14f2a83a792218e2b0b46859f6788e099db7873db886a5c2ec0af2826d2a73e5d79e78a2715eec7f36ebcb312e87f7daeb6e6ecce7f88fbeb7f8890e11d6b35f2e49df09ca6eebc2f0835a280ad84abbc9b3ed31e1438048ff5afe722d3ed3a1af7a6c3e7f07f4a4de58443e264fc6d7335bd326c747772daea7f42d3931f7c59a4749d5e442256b10b60b27f3275ff8c981b2a4af2c283fb1f40cde0ba30ee1fc087f1171c45758df7897fa1b2ac8495490210035d99bf4909d8c905b0260dbac903596c5c7839b193cf57c796bd3b69490f7bd0adfebdb296ecfa3cc994d1e7b76d5b694b00bb8d679376928697520adbcef9b513fcc92f216420ea95f9fc5e71fd22a982563cf9b4cec57ac66cc420d94c88569f5a715292bd8450735cff08fd4f684400190df78a309c02f3fefe507231903f56f4f2fccbd37fb5d54441029b822f4ceccc68adadfdd458ec5c89d2982343c0cd23039db490f92a3541b049763d04c66c08bca633fb681f0a757506766488271f7d3d8375ce360c3bc1ff3820b62875ad7521b34dce16e3ec439ad7219f0513074fe296b1cfa7fd5d05f4aea5de26fa70bd4e6c0934c0a11af974a066df40f61434a", 0x1eb, 0x3}]) 06:43:39 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) r1 = socket$inet(0x10, 0x3, 0xc) sendmsg(r1, &(0x7f000001d000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000100)="24000000100007031dff22946fa2830020200a0009000300001d85687f0000000400ff7e28000000090a43ba5d806055b6fdd80b40000000030008000029ec2400020cd37e99d69cda45a95e", 0x4c}], 0x1}, 0x0) r2 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r2, 0xc0205647, &(0x7f00000000c0)={0xf000000, 0x7, 0x9, [], &(0x7f0000000080)={0x9c0001, 0x40, [], @ptr=0x4}}) r3 = syz_open_dev$midi(&(0x7f0000000200)='/dev/midi#\x00', 0x81, 0x80) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r4, 0x401c5820, &(0x7f0000000180)=0x18) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@empty}}, &(0x7f0000000480)=0xe8) fstat(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, 0x0, 0x0, r6) chown(&(0x7f0000000340)='./file0\x00', r5, r6) accept$packet(r3, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000280)=0x14) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) [ 897.230392][ T8437] could not allocate digest TFM handle poly1305-simd [ 897.242624][ T8452] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 897.264319][ T8448] Dev loop5: unable to read RDB block 9 [ 897.270138][ T8448] loop5: AHDI p1 p2 p4 06:43:40 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0xffffffffffffff12}, 0x18b) 06:43:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, &(0x7f0000000180)=0x18) ioctl$NS_GET_OWNER_UID(r0, 0xb704, &(0x7f0000000080)=0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1000, &(0x7f0000000140)={[], [{@fowner_lt={'fowner<'}}, {@uid_gt={'uid>', r1}}, {@smackfsdef={'smackfsdef', 0x3d, 'fowner<'}}, {@euid_gt={'euid>', 0xee00}}]}) 06:43:40 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 06:43:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x03\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 897.308383][ T8448] loop5: partition table partially beyond EOD, truncated [ 897.316048][ T8448] loop5: p1 start 1362130174 is beyond EOD, truncated [ 897.323002][ T8448] loop5: p2 start 1256873442 is beyond EOD, truncated [ 897.425184][ T8448] Dev loop5: unable to read RDB block 9 [ 897.441788][ T8448] loop5: AHDI p1 p2 p4 [ 897.452333][ T8448] loop5: partition table partially beyond EOD, truncated [ 897.472540][ T8448] loop5: p1 start 1362130174 is beyond EOD, truncated [ 897.487401][ T8448] loop5: p2 start 1256873442 is beyond EOD, truncated 06:43:40 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:43:40 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0) [ 897.713763][ T8474] Dev loop5: unable to read RDB block 9 [ 897.738537][ T8474] loop5: AHDI p1 p2 p4 [ 897.762092][ T8474] loop5: partition table partially beyond EOD, truncated [ 897.799361][ T8474] loop5: p1 start 1362130174 is beyond EOD, truncated [ 897.826741][ T8474] loop5: p2 start 1256873442 is beyond EOD, truncated [ 897.842823][ T8469] could not allocate digest TFM handle poly1305-simd 06:43:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="666fffff6770c309c891723c93", @ANYRESDEC=0x0, @ANYBLOB="2c736d61636b66736861743de676626f786e657431402c61707072616973655f747970653d696d617369672c686173682c00"]) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, &(0x7f0000000180)=0x18) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000), 0x10) [ 897.898850][ T8473] could not allocate digest TFM handle poly1305-simd 06:43:40 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0) 06:43:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x04\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 898.035873][ T8474] Dev loop5: unable to read RDB block 9 [ 898.041579][ T8474] loop5: AHDI p1 p2 p4 [ 898.062518][ T8462] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.1'. [ 898.108697][ T8474] loop5: partition table partially beyond EOD, truncated [ 898.149516][ T8474] loop5: p1 start 1362130174 is beyond EOD, truncated 06:43:41 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xf}, 0x0) [ 898.255724][ T8474] loop5: p2 start 1256873442 is beyond EOD, truncated [ 898.308576][ T27] audit: type=1800 audit(1574318621.090:100): pid=8501 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.1" name="cpuacct.usage_percpu_sys" dev="sda1" ino=16697 res=0 06:43:41 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) [ 898.440355][ T8504] could not allocate digest TFM handle poly1305-simd 06:43:41 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) r1 = getpid() process_vm_writev(r1, &(0x7f0000000480)=[{&(0x7f0000000180)=""/182, 0xb6}, {&(0x7f0000000080)=""/11, 0xb}, {&(0x7f0000000240)=""/127, 0x7f}, {&(0x7f0000000500)=""/34, 0x20}, {&(0x7f00000002c0)=""/60, 0x3c}, {&(0x7f0000000300)=""/201, 0xc9}], 0x6, &(0x7f0000000940)=[{&(0x7f0000000580)=""/127, 0x7f}, {&(0x7f0000000600)=""/83, 0x53}, {&(0x7f0000000400)=""/62, 0x3e}, {&(0x7f0000000680)=""/87, 0xac}, {&(0x7f0000000700)=""/117, 0xfffffee0}, {&(0x7f0000000780)=""/151, 0x97}, {&(0x7f0000000840)=""/220, 0xdc}], 0x7, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x0, 0x1c, 0xbf, 0x3f, 0x0, 0x0, 0x60a69, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xa, @perf_bp={&(0x7f0000000000), 0x1}, 0x2000, 0x2, 0x2, 0x4, 0x80000001, 0x9ae800, 0x1}, r1, 0x2, 0xffffffffffffffff, 0x8) 06:43:41 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r2, 0x401c5820, &(0x7f0000000180)=0x18) ioctl$RTC_PIE_OFF(r2, 0x7006) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78}, 0x78) [ 898.513956][ T8509] could not allocate digest TFM handle poly1305-simd [ 898.535779][ T8499] FAT-fs (loop3): Unrecognized mount option "foÿÿgpà ȑr<“00000000000000000000" or missing value 06:43:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x05\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:41 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x21}, 0x0) [ 898.775207][ T8528] Dev loop5: unable to read RDB block 9 [ 898.821424][ T8528] loop5: AHDI p1 p2 p4 [ 898.852005][ T8528] loop5: partition table partially beyond EOD, truncated [ 898.922561][ T8528] loop5: p1 start 1362130174 is beyond EOD, truncated [ 898.931770][ T8538] could not allocate digest TFM handle poly1305-simd [ 898.952345][ T8528] loop5: p2 start 1256873442 is beyond EOD, truncated 06:43:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x06\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:41 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xf00}, 0x0) 06:43:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imasig'}, {@hash='hash'}]}) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$TIOCEXCL(r0, 0x540c) r1 = getpid() process_vm_writev(r1, &(0x7f0000000480)=[{&(0x7f0000000180)=""/182, 0xb6}, {&(0x7f0000000080)=""/11, 0xb}, {&(0x7f0000000240)=""/127, 0x7f}, {&(0x7f0000000500)=""/34, 0x20}, {&(0x7f00000002c0)=""/60, 0x3c}, {&(0x7f0000000300)=""/201, 0xc9}], 0x6, &(0x7f0000000940)=[{&(0x7f0000000580)=""/127, 0x7f}, {&(0x7f0000000600)=""/83, 0x53}, {&(0x7f0000000400)=""/62, 0x3e}, {&(0x7f0000000680)=""/87, 0xac}, {&(0x7f0000000700)=""/117, 0xfffffee0}, {&(0x7f0000000780)=""/151, 0x97}, {&(0x7f0000000840)=""/220, 0xdc}], 0x7, 0x0) r2 = getpgid(r1) ptrace$getenv(0x4201, r2, 0xffffffffffffffd8, &(0x7f0000000040)) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x0, 0x0) dup2(r3, r4) fcntl$notify(r4, 0x402, 0x80000026) [ 899.133898][ T8528] Dev loop5: unable to read RDB block 9 [ 899.139532][ T8528] loop5: AHDI p1 p2 p4 [ 899.197276][ T8528] loop5: partition table partially beyond EOD, truncated [ 899.260689][ T8528] loop5: p1 start 1362130174 is beyond EOD, truncated [ 899.295533][ T8528] loop5: p2 start 1256873442 is beyond EOD, truncated 06:43:42 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2100}, 0x0) [ 899.371078][ T8552] could not allocate digest TFM handle poly1305-simd [ 899.421102][ T8556] could not allocate digest TFM handle poly1305-simd 06:43:42 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) close(r1) io_setup(0x7, &(0x7f0000000140)=0x0) prctl$PR_MCE_KILL(0x21, 0x1, 0x1) io_submit(r2, 0x1e09328e, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x12f}]) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r3, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r3, 0x401c5820, &(0x7f0000000180)=0x18) ioctl$RNDADDTOENTCNT(r3, 0x40045201, &(0x7f0000000100)=0x4) io_submit(r2, 0x0, &(0x7f0000000080)) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x3, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000040)) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") setsockopt$SO_RDS_TRANSPORT(0xffffffffffffffff, 0x114, 0x8, &(0x7f0000000080)=0xffffffffffffffff, 0x4) ioctl$sock_SIOCINQ(r4, 0x541b, &(0x7f0000000000)) r5 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x8, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r5, 0x80dc5521, &(0x7f0000000300)=""/4096) 06:43:42 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:43:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\a\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:42 executing program 4: r0 = dup(0xffffffffffffffff) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r0, &(0x7f0000000180)={0x78}, 0x78) 06:43:42 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3f00}, 0x0) [ 899.763155][ T8580] Dev loop5: unable to read RDB block 9 [ 899.802340][ T8580] loop5: AHDI p1 p2 p4 [ 899.821405][ T8580] loop5: partition table partially beyond EOD, truncated [ 899.860686][ T8580] loop5: p1 start 1362130174 is beyond EOD, truncated [ 899.893477][ T8580] loop5: p2 start 1256873442 is beyond EOD, truncated [ 899.925548][ T8594] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value 06:43:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\n\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 899.988399][ T8579] could not allocate digest TFM handle poly1305-simd 06:43:42 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0x0) [ 900.084628][ T8580] Dev loop5: unable to read RDB block 9 [ 900.107345][ T8580] loop5: AHDI p1 p2 p4 [ 900.132281][ T8580] loop5: partition table partially beyond EOD, truncated [ 900.145993][ T8580] loop5: p1 start 1362130174 is beyond EOD, truncated [ 900.167601][ T8588] FAT-fs (loop3): Unrecognized mount option "€" or missing value [ 900.194642][ T8580] loop5: p2 start 1256873442 is beyond EOD, truncated 06:43:43 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r0, 0x2283, &(0x7f00000002c0)=0x2f) ioctl$KVM_GET_IRQCHIP(r1, 0xc208ae62, &(0x7f0000000040)={0x0, 0x0, @ioapic}) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x2a4, 0x0, 0x0, {0x4000000000000000, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}}, 0x78) 06:43:43 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0x0) 06:43:43 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:43:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imasig'}, {@hash='hash'}]}) ioctl$KVM_SET_IRQCHIP(0xffffffffffffffff, 0x8208ae63, &(0x7f0000000000)={0x1, 0x0, @ioapic={0xd000, 0xffff8000, 0xf1a, 0x3, 0x0, [{0xff, 0x3, 0x0, [], 0x5}, {0x1, 0x1, 0x5, [], 0x2}, {0x3, 0xae, 0xff, [], 0xee}, {0x9d, 0x4, 0x38}, {0x81, 0x4, 0x1, [], 0x1}, {0x6, 0x4, 0x9, [], 0x2}, {0x2, 0x0, 0x7, [], 0x1}, {0x81, 0x0, 0x2c, [], 0xff}, {0x7f, 0x6, 0x0, [], 0x1f}, {0xaf, 0x3f, 0x2, [], 0x1}, {0x75, 0x20, 0xfe, [], 0xde}, {0x7, 0x0, 0x6}, {0x5d, 0x84, 0x9, [], 0x6}, {0x0, 0x4, 0xb8, [], 0x4}, {0x5e, 0x1f, 0x8, [], 0x2}, {0x5, 0x80, 0x0, [], 0x7}, {0x8, 0x4, 0x7, [], 0x40}, {0xe3, 0x9, 0x9, [], 0xff}, {0x9, 0x20, 0x7f, [], 0x1}, {0x9, 0x9, 0x1, [], 0x7}, {0x51, 0x20, 0x6, [], 0x8}, {0x0, 0xf7, 0x0, [], 0xf8}, {0x7, 0xb7, 0x8}, {0x3, 0x83, 0x9, [], 0x20}]}}) [ 900.393494][ T8604] could not allocate digest TFM handle poly1305-simd [ 900.393494][ T8604] 06:43:43 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x400, 0x0) r1 = dup(r0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x220000, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r2, 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="ca000000000000000300000014c8c906a0f6b7498cc9945c67dae6fd475c76d563adcd3d2331c4313592371c5ff219c73c3e68dc9a8391e1d0c6bdd085edff389c68741faf4997baacfd3cac94c3d8609608efadd521b4c5caf840d67b95f346cc5a05a2fbecb679bad0b9a3b183aaf6f5f26be79ba129466e035038d310dec4808aa3b7828c3d7497afd6ec7323db0d73e4da282e77b255ab5a068283234b6b4cc99698a075d5feb4a5a64ff788c1999e67c182831cc6f901ef015f479c874cf5e87e91983bff233984c600"/221]) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78}, 0x78) [ 900.461425][ T8609] could not allocate digest TFM handle poly1305-simd [ 900.461425][ T8609] [ 900.694279][ T8636] Dev loop5: unable to read RDB block 9 [ 900.711050][ T8636] loop5: AHDI p1 p2 p4 [ 900.724577][ T8636] loop5: partition table partially beyond EOD, truncated [ 900.771790][ T8636] loop5: p1 start 1362130174 is beyond EOD, truncated 06:43:43 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x5, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2, 0x0, 0x29f8970025422b81}, &(0x7f0000000300)) 06:43:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x0f\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:43 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xf000000}, 0x0) [ 900.816009][ T8642] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value [ 900.821516][ T8636] loop5: p2 start 1256873442 is beyond EOD, truncated 06:43:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x9d8, 0x1000) ioctl$IOC_PR_REGISTER(r0, 0x401870c8, &(0x7f0000000040)={0x0, 0x6, 0x1}) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={[], [{@fowner_lt={'fowner<'}}, {@smackfshat={'smackfshat', 0x3d, '\xe6vboxnet1@'}}, {@appraise_type='appraise_type=imasig'}, {@hash='hash'}]}) 06:43:43 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, &(0x7f0000000180)=0x18) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000000c0)={&(0x7f0000000300)={0x1c8, r1, 0x0, 0x70bd28, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_DAEMON={0x60, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x6d}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0x101}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x0, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @initdev={0xac, 0x1e, 0x0, 0x0}}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}]}, @IPVS_CMD_ATTR_DAEMON={0x48, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x6}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'tunl0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0xffffffffffffff57, 0x2, 'veth1_to_bond\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'dummy0\x00'}]}, @IPVS_CMD_ATTR_SERVICE={0x58, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x36}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_AF={0x8}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x7}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x88}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x6e}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x89}]}, @IPVS_CMD_ATTR_DAEMON={0x64, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip_vti0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x9}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bridge0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x80001}]}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}]}]}, 0x1c8}, 0x1, 0x0, 0x0, 0x8001}, 0x4002004) r2 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r3 = dup(r2) ioctl$SG_NEXT_CMD_LEN(r3, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r3, &(0x7f0000000180)={0x78}, 0x78) 06:43:43 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x21000000}, 0x0) [ 901.022945][ T8652] could not allocate digest TFM handle poly1305-simd [ 901.065809][ T8652] could not allocate digest TFM handle poly1305-simd [ 901.100294][ T8636] Dev loop5: unable to read RDB block 9 06:43:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simdH\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 901.142548][ T8636] loop5: AHDI p1 p2 p4 [ 901.146788][ T8636] loop5: partition table partially beyond EOD, truncated [ 901.216875][ T8636] loop5: p1 start 1362130174 is beyond EOD, truncated [ 901.275195][ T8636] loop5: p2 start 1256873442 is beyond EOD, truncated 06:43:44 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3f000000}, 0x0) [ 901.332016][ T8662] FAT-fs (loop3): Unrecognized mount option "fowner<00000000000000000000" or missing value 06:43:44 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) [ 901.414504][ T8679] could not allocate digest TFM handle poly1305-simdH 06:43:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simdL\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 901.586176][ T8692] Dev loop5: unable to read RDB block 9 [ 901.639312][ T8692] loop5: AHDI p1 p2 p4 06:43:44 executing program 3: r0 = clone3(&(0x7f0000000180)={0x40000000, &(0x7f0000000000), &(0x7f0000000040)=0x0, &(0x7f0000000080), 0x36, 0x0, &(0x7f00000000c0)=""/82, 0x52, &(0x7f0000000140)=""/25}, 0x40) ptrace$pokeuser(0x6, r1, 0xbe7, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x48080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x9f3}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r2, 0x401c5820, &(0x7f0000000180)=0x18) ioctl$IOC_PR_RELEASE(r2, 0x401070ca, &(0x7f0000000800)={0x3ff, 0x7, 0x1}) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB="627f0f683c8b77", @ANYRESDEC=0x0, @ANYBLOB="0a736d61636b66736861743de676626f786e156fa4aad5f6049d72616973655f747970653d696d617369672c686173682c00"]) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") r4 = syz_open_dev$media(&(0x7f00000005c0)='/dev/media#\x00', 0x2, 0x8de3aa2992f67e82) getsockopt$bt_BT_POWER(r4, 0x112, 0x9, &(0x7f0000000600)=0xaf, &(0x7f0000000640)=0x1) recvmsg(r3, &(0x7f0000000440)={&(0x7f00000001c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000240)=""/97, 0x61}, {&(0x7f0000000340)=""/151, 0x97}], 0x2}, 0x2000) syz_genetlink_get_family_id$tipc(&(0x7f00000004c0)='TIPC\x00') r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_ENABLE_BEARER(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r7, 0x42b, 0x0, 0x0, {{}, 0x0, 0x4101, 0x0, {0x18, 0x17, {0x0, 0x0, @l2={'eth', 0x3a, 'caif0\x00'}}}}}, 0x34}}, 0x0) sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r5, &(0x7f0000000580)={&(0x7f0000000480), 0xc, &(0x7f0000000540)={&(0x7f0000000500)={0x1c, r7, 0x400, 0x70bd2b, 0x25dfdbfd, {}, ["", ""]}, 0x1c}}, 0x42040081) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r8, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r8, 0x401c5820, &(0x7f0000000180)=0x18) setsockopt$RDS_GET_MR(r8, 0x114, 0x2, &(0x7f00000007c0)={{&(0x7f0000000680)=""/219, 0xdb}, &(0x7f0000000780), 0x1}, 0x20) 06:43:44 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r1, 0x401c5820, &(0x7f0000000180)=0x18) setsockopt$bt_BT_POWER(r1, 0x112, 0x9, &(0x7f0000000000), 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1cac}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) [ 901.702464][ T8692] loop5: partition table partially beyond EOD, truncated [ 901.753219][ T8692] loop5: p1 start 1362130174 is beyond EOD, truncated [ 901.761970][ T8692] loop5: p2 start 1256873442 is beyond EOD, truncated [ 901.813119][ T8699] could not allocate digest TFM handle poly1305-simdL 06:43:44 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) fanotify_init(0x2, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x40, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r2, 0x401c5820, &(0x7f0000000180)=0x18) ioctl$EVIOCGVERSION(r2, 0x80044501, &(0x7f0000000340)=""/219) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f00000000c0)="0800a1695e1dcfe87b1071") ioctl$sock_inet_SIOCGIFDSTADDR(r3, 0x8917, &(0x7f0000000080)={'hwsim0\x00', {0x2, 0x4e24, @empty}}) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0x28, 0x2, 0x0, {0x6, 0x9, 0x401}}, 0x28) [ 901.854397][ T8699] could not allocate digest TFM handle poly1305-simdL [ 901.917650][ T8710] IPVS: ftp: loaded support on port[0] = 21 [ 901.934427][ T8692] Dev loop5: unable to read RDB block 9 [ 901.942563][ T8692] loop5: AHDI p1 p2 p4 [ 901.961366][ T8726] tipc: Started in network mode 06:43:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simdh\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 901.975452][ T8726] tipc: Own node identity , cluster identity 4711 [ 901.986247][ T8692] loop5: partition table partially beyond EOD, truncated [ 901.993566][ T8726] tipc: Failed to obtain node identity [ 902.011346][ T8726] tipc: Enabling of bearer rejected, failed to enable media [ 902.090799][ T8692] loop5: p1 start 1362130174 is beyond EOD, truncated [ 902.115528][ T8722] FAT-fs (loop3): Unrecognized mount option "bh<‹w00000000000000000000 [ 902.115528][ T8722] smackfshat=ævboxno¤ªÕöraise_type=imasig" or missing value [ 902.151268][ T8692] loop5: p2 start 1256873442 is beyond EOD, truncated 06:43:45 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78}, 0x78) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000080), 0x15d4b87) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r4) r5 = getgid() write$FUSE_ATTR(r1, &(0x7f0000000200)={0x78, 0x0, 0x8, {0x4, 0x1000, 0x0, {0x2, 0x10000, 0x4, 0x6, 0x9, 0x2, 0x0, 0x7fffffff, 0x20, 0x7, 0x7, r4, r5, 0x80, 0x2}}}, 0x78) r6 = syz_open_dev$midi(&(0x7f0000000300)='/dev/midi#\x00', 0x1, 0x401200) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r6, 0x84, 0x4, &(0x7f0000000340)=0x2, 0x4) prctl$PR_GET_CHILD_SUBREAPER(0x25) ioctl$EXT4_IOC_SETFLAGS(r2, 0x401c5820, &(0x7f0000000180)=0x18) recvfrom$unix(r2, &(0x7f0000000040)=""/163, 0xa3, 0x100, &(0x7f0000000100)=@abs={0x1, 0x0, 0x4e20}, 0x6e) 06:43:45 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) [ 902.320310][ T8736] could not allocate digest TFM handle poly1305-simdh 06:43:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simdl\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 902.532981][ T8729] tipc: Started in network mode [ 902.553979][ T8729] tipc: Own node identity , cluster identity 4711 [ 902.598617][ T8757] Dev loop5: unable to read RDB block 9 [ 902.605037][ T8714] FAT-fs (loop3): Unrecognized mount option "bh<‹w00000000000000000000 [ 902.605037][ T8714] smackfshat=ævboxno¤ªÕöraise_type=imasig" or missing value [ 902.663268][ T8757] loop5: AHDI p1 p2 p4 [ 902.704439][ T8757] loop5: partition table partially beyond EOD, truncated [ 902.755097][ T8757] loop5: p1 start 1362130174 is beyond EOD, truncated [ 902.812299][ T8757] loop5: p2 start 1256873442 is beyond EOD, truncated [ 902.826647][ T8710] IPVS: ftp: loaded support on port[0] = 21 [ 902.887210][ T8729] tipc: Failed to obtain node identity [ 902.893540][ T8729] tipc: Enabling of bearer rejected, failed to enable media [ 902.923307][ T8764] could not allocate digest TFM handle poly1305-simdl [ 902.995036][ T8766] could not allocate digest TFM handle poly1305-simdl [ 903.026187][ T919] tipc: TX() has been purged, node left! 06:43:45 executing program 0: r0 = semget$private(0x0, 0x1, 0x924ebb82254b4603) semctl$SEM_STAT(r0, 0x2, 0x12, &(0x7f0000000300)=""/4096) io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) [ 903.053825][ T8757] Dev loop5: unable to read RDB block 9 [ 903.071496][ T8757] loop5: AHDI p1 p2 p4 06:43:45 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r1, 0x401c5820, &(0x7f0000000180)=0x18) write$FUSE_GETXATTR(r1, &(0x7f0000000140)={0x18, 0x0, 0x4, {0xf7}}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x9, 0x0, 0x0, 0x0, 0x0, 0x3, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x80, 0x400080) io_cancel(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000002c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2, 0x0, 0x0, r2}, &(0x7f0000000300)) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r3, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r3, 0x401c5820, &(0x7f0000000200)=0x4000) r4 = accept4$x25(r3, &(0x7f0000000080)={0x9, @remote}, &(0x7f00000000c0)=0x12, 0x80800) ioctl$sock_SIOCGSKNS(r4, 0x894c, &(0x7f0000000100)=0x1) r5 = socket(0x2, 0x5, 0x20) connect$caif(r5, &(0x7f0000000280)=@dbg={0x25, 0x81, 0x3}, 0x18) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000000240)=0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, r6, 0x9, &(0x7f0000000340)=""/177) 06:43:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simdt\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 903.148802][ T8757] loop5: partition table partially beyond EOD, truncated [ 903.200547][ T8757] loop5: p1 start 1362130174 is beyond EOD, truncated [ 903.212497][ T8757] loop5: p2 start 1256873442 is beyond EOD, truncated 06:43:46 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) [ 903.564743][ T8784] could not allocate digest TFM handle poly1305-simdt [ 903.582101][ T8796] Dev loop5: unable to read RDB block 9 [ 903.604011][ T8796] loop5: AHDI p1 p2 p4 [ 903.616395][ T8796] loop5: partition table partially beyond EOD, truncated [ 903.725957][ T8796] loop5: p1 start 1362130174 is beyond EOD, truncated 06:43:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simdz\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 903.782755][ T8796] loop5: p2 start 1256873442 is beyond EOD, truncated [ 903.965480][ T8796] Dev loop5: unable to read RDB block 9 [ 903.971922][ T8796] loop5: AHDI p1 p2 p4 [ 904.021370][ T8796] loop5: partition table partially beyond EOD, truncated [ 904.075874][ T8796] loop5: p1 start 1362130174 is beyond EOD, truncated [ 904.112462][ T8796] loop5: p2 start 1256873442 is beyond EOD, truncated [ 904.153419][ T8809] could not allocate digest TFM handle poly1305-simdz 06:43:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="666f776e65461728198cee26f1a0b506003c", @ANYRESDEC=0x0, @ANYBLOB="2c736d61636b66736861743de676626f786e657431402c61707072616973655f747970653d696d617369672c686173682c00"]) 06:43:50 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) r2 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x3, 0x200) ioctl$SG_GET_COMMAND_Q(r2, 0x2270, &(0x7f0000000080)) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78}, 0x78) 06:43:50 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 06:43:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x03\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:50 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="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", 0x1eb, 0x3}]) 06:43:50 executing program 1: r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0xfff, 0x8c802) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) io_cancel(0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r1, 0x401c5820, &(0x7f0000000180)=0x18) ioctl$VIDIOC_STREAMOFF(r1, 0x40045613, &(0x7f0000000040)=0x1) 06:43:50 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000}}}, 0x78) ioctl$EVIOCSABS20(r1, 0x401845e0, &(0x7f0000000080)={0x6, 0x1, 0x3, 0x8, 0x4, 0x1}) r2 = openat$ashmem(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ashmem\x00', 0x408001, 0x0) dup2(r2, r1) 06:43:50 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x10) [ 907.636729][ T8934] Dev loop5: unable to read RDB block 9 [ 907.662491][ T8934] loop5: AHDI p1 p2 p4 06:43:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x05\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:50 executing program 1: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_init_net_socket$netrom(0x6, 0x5, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x0, 0x0) dup2(r1, r2) r3 = fcntl$dupfd(0xffffffffffffffff, 0x406, r1) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x200802, 0x0) epoll_pwait(r4, &(0x7f0000000100)=[{}, {}], 0x2, 0x7, &(0x7f0000000140)={0x5}, 0x8) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x8042, 0x0) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000040)=r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r6, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r6, 0x401c5820, &(0x7f0000000180)=0x18) ioctl$BLKTRACESTOP(r6, 0x1275, 0x0) [ 907.750719][ T8934] loop5: partition table partially beyond EOD, truncated [ 907.815658][ T8934] loop5: p1 start 1362130174 is beyond EOD, truncated [ 907.827711][ T8934] loop5: p2 start 1256873442 is beyond EOD, truncated 06:43:50 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78, 0x0, 0x0, {0x9, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0xc5f9}}}, 0x78) 06:43:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x06\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 908.071353][ T8934] Dev loop5: unable to read RDB block 9 [ 908.080327][ T8934] loop5: AHDI p1 p2 p4 [ 908.094243][ T8934] loop5: partition table partially beyond EOD, truncated [ 908.203513][ T8934] loop5: p1 start 1362130174 is beyond EOD, truncated [ 908.210370][ T8934] loop5: p2 start 1256873442 is beyond EOD, truncated [ 908.229865][ T8947] FAT-fs (loop3): Unrecognized mount option "fowneF(Œî&ñ µ" or missing value 06:43:51 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x2) r1 = dup(r0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r2, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r2, 0x401c5820, &(0x7f0000000180)=0x18) ioctl$VHOST_SET_LOG_BASE(r2, 0x4008af04, &(0x7f0000000080)=&(0x7f0000000040)) ioctl$SG_NEXT_CMD_LEN(r1, 0x2283, &(0x7f00000002c0)=0x2f) write$FUSE_ATTR(r1, &(0x7f0000000180)={0x78}, 0x78) 06:43:51 executing program 0: io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r1, 0x401c5820, &(0x7f0000000180)=0x18) ioctl$EVIOCGBITSND(r1, 0x80404532, &(0x7f0000000000)=""/58) socket$inet_udp(0x2, 0x2, 0x0) 06:43:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\a\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) 06:43:51 executing program 5: syz_read_part_table(0x0, 0x2, &(0x7f0000002580)=[{0x0, 0x0, 0x914}, {&(0x7f0000000300)="ae02e0285451423020bf4bb1f233a32d034ce718517fcc6feba8e13da3f25b822c0caedef77480025ed03931ee0b25e16c7076dc14f2a83a792218e2b0b46859f6298e0b9db7873db886a5c2ec0af2826d2a73e5d79e78a2715eec7f36ebcb312e87f7daeb6e6ecce7f88fbeb7f8890e11d6b35f2e49df09ca6eebc2f0835a280ad84abbc9b3ed31e1438048ff5afe722d3ed3a1af7a6c3e7f07f4a4de58443e264fc6d7335bd326c747772daea7f42d3931f7c59a4749d5e442256b10b60b27f3275ff8c981b2a4af2c283fb1f40cde0ba30ee1fc087f1171c45758df7897fa1b2ac8495490210035d99bf4909d8c905b0260dbac903596c5c7839b193cf57c796bd3b69490f7bd0adfebdb296ecfa3cc994d1e7b76d5b694b00bb8d679376928697520adbcef9b513fcc92f216420ea95f9fc5e71fd22a982563cf9b4cec57ac66cc420d94c88569f5a715292bd8450735cff08fd4f684400190df78a309c02f3fefe507231903f56f4f2fccbd37fb5d54441029b822f4ceccc68adadfdd458ec5c89d2982343c0cd23039db490f92a3541b049763d04c66c08bca633fb681f0a757506766488271f7d3d8375ce360c3bc1ff3820b62875ad7521b34dce16e3ec439ad7219f0513074fe296b1cfa7fd5d05f4aea5de26fa70bd4e6c0934c0a11af974a066df40f61434a", 0x1eb, 0x3}]) 06:43:51 executing program 1: getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)=ANY=[@ANYBLOB="99000000ffff00109aa0d91f9028d666f074674d0fcc9a7d7f7e5ec5a82e078260395ad232219a0512af78779eaa08ae07a97610e97635e20b528b1afd16b507d4d9aae3be9b4f1d05b3b5250436832e777465f96f8c37d8f55628a49ab05c557350164343bfc897b8f1ccc6478e9cb8153b08cf34801946cae616f14aa19560dea68daf34b31b180d70b9a7d4db7deb1fd84b52010061f6cb4f7e8e1ebede138844ef7d6ce797a67420210789d115cfd88447c5cd93b5b77d10cf7fc7fee95724352747841651ba45ed5f7a04e455f95b1a8798a200"], &(0x7f0000000080)=""/55, 0x37) io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, &(0x7f00000001c0)="fa04ce2d98a67df084e387a0aa310af5e911738954850d90ff9c7bdd63e4621caf47fec5494d044e96c0b2e603358ef4e06acda220459e7336994d39", 0x3c, 0x2}, &(0x7f0000000300)) 06:43:51 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x80, 0x0) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000140)={0x5, 0x81, 0x3}) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x800481, 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r1, 0xc0305302, &(0x7f00000000c0)={0xf0, 0xfffff801, 0x20, 0x401, 0x80}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r3, &(0x7f0000000080), 0x15d4b87) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r4, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r4, 0x401c5820, &(0x7f0000000180)=0x18) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r5, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r5, 0x401c5820, &(0x7f0000000180)=0x18) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r6, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r6, 0x401c5820, &(0x7f0000000180)=0x18) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r5, 0xc00c642e, &(0x7f0000000440)={0x0, 0x80000, r6}) ioctl$DRM_IOCTL_GEM_FLINK(r4, 0xc008640a, &(0x7f0000000480)={r7}) ioctl$EXT4_IOC_SETFLAGS(r3, 0x401c5820, &(0x7f0000000180)=0x18) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000200)={'mangle\x00', 0x75, "0e8d91a2fc725c1bbb39e695711740ab8daf98a6363317ac3503fab0f890e89b545923e83a8154a50b0ef4905d2eb7ba0b1ce24f76508e9ca5cf600b7af0c1e1e0d0571e6e0834fdca87dcc2103e653c594d7e3a24bae982c31562fb80a47b87b78ea1519218d2061066354940e5f4f81623e063cf"}, &(0x7f0000000340)=0x99) r8 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r9 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz'}, &(0x7f0000000100), 0xca, 0xfffffffffffffffe) keyctl$read(0xb, r9, &(0x7f0000000240)=""/112, 0x349b7f55) keyctl$instantiate(0xc, r8, &(0x7f0000000400)=@encrypted_update={'update ', 'ecryptfs', 0x20, 'user:', 'keyring,)eth0vmnet0'}, 0x29, r9) write$cgroup_int(r2, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r2, 0x401c5820, &(0x7f0000000180)=0x18) getsockopt$TIPC_NODE_RECVQ_DEPTH(r2, 0x10f, 0x83, &(0x7f0000000180), &(0x7f00000001c0)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x800) setsockopt$inet6_tcp_TLS_RX(r10, 0x6, 0x2, &(0x7f0000000040)=@ccm_128={{0x285}, "da48881eab0a743d", "adccb7ccd64bf23954c1723c27670599", "6d3f36e0", "829c4718f0096aab"}, 0x28) syz_mount_image$vfat(&(0x7f00000002c0)='vfat\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)=ANY=[@ANYBLOB='f\x00\x00ner<', @ANYRESDEC=0x0, @ANYBLOB="2c736d61636b66736861743de676626f786e657431402c61707072616973655f747970653d696d617369672c686173682c00"]) [ 908.724076][ T8994] Dev loop5: unable to read RDB block 9 [ 908.729981][ T8994] loop5: AHDI p1 p2 p4 [ 908.758966][ T8994] loop5: partition table partially beyond EOD, truncated 06:43:51 executing program 1: io_setup(0x7ff, &(0x7f0000000180)) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x1, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x15d4b87) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x0, 0x0) dup2(r1, r2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) openat$vimc0(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video0\x00', 0x2, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x401c5820, &(0x7f0000000180)=0x18) ioctl$UI_SET_MSCBIT(r0, 0x40045568, 0x0) 06:43:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\n\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 908.773737][ T8994] loop5: p1 start 1362130174 is beyond EOD, truncated [ 908.785705][ T8994] loop5: p2 start 1256873442 is beyond EOD, truncated [ 908.883252][ T9003] encrypted_key: insufficient parameters specified [ 908.993260][ T8994] Dev loop5: unable to read RDB block 9 [ 908.999133][ T8994] loop5: AHDI p1 p2 p4 [ 909.009346][ T8994] loop5: partition table partially beyond EOD, truncated [ 909.026346][ T8994] loop5: p1 start 1362130174 is beyond EOD, truncated [ 909.045420][ T8994] loop5: p2 start 1256873442 is beyond EOD, truncated 06:43:51 executing program 0: iopl(0x3) io_setup(0x7ff, &(0x7f0000000180)=0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x0) read$FUSE(r4, &(0x7f0000000880), 0x1000) r5 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffc66) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000080)=[@textreal={0x8, &(0x7f0000000200)="0f22270f606ca7baf80cf30fe6b1020066efbafc0c66ed43ed66b91e0100000f320f20d80f22d8aeb800008ed83abc1fbc1f81d90c0066f2ba5f57160fc766b9bc0208000f32", 0x46}], 0x1, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r5, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r5, 0xae9a) ioctl$KVM_RUN(r5, 0xae80, 0x0) r6 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0x0, 0x0) dup2(r1, r6) io_cancel(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x7, 0xfaa, r6, 0x0, 0x0, 0x1400000000, 0x0, 0x1}, 0x0) r7 = getpid() process_vm_writev(r7, &(0x7f0000000480)=[{&(0x7f0000000180)=""/182, 0xb6}, {&(0x7f0000000080)=""/11, 0xb}, {&(0x7f0000000240)=""/127, 0x7f}, {&(0x7f0000000500)=""/34, 0x20}, {&(0x7f00000002c0)=""/60, 0x3c}, {&(0x7f0000000300)=""/201, 0xc9}], 0x6, &(0x7f0000000940)=[{&(0x7f0000000580)=""/127, 0x7f}, {&(0x7f0000000600)=""/83, 0x53}, {&(0x7f0000000400)=""/62, 0x3e}, {&(0x7f0000000680)=""/87, 0xac}, {&(0x7f0000000700)=""/117, 0xfffffee0}, {&(0x7f0000000780)=""/151, 0x97}, {&(0x7f0000000840)=""/220, 0xdc}], 0x7, 0x0) r8 = getpid() process_vm_writev(r8, &(0x7f0000000480)=[{&(0x7f0000000180)=""/182, 0xb6}, {&(0x7f0000000080)=""/11, 0xb}, {&(0x7f0000000240)=""/127, 0x7f}, {&(0x7f0000000500)=""/34, 0x20}, {&(0x7f00000002c0)=""/60, 0x3c}, {&(0x7f0000000300)=""/201, 0xc9}], 0x6, &(0x7f0000000940)=[{&(0x7f0000000580)=""/127, 0x7f}, {&(0x7f0000000600)=""/83, 0x53}, {&(0x7f0000000400)=""/62, 0x3e}, {&(0x7f0000000680)=""/87, 0xac}, {&(0x7f0000000700)=""/117, 0xfffffee0}, {&(0x7f0000000780)=""/151, 0x97}, {&(0x7f0000000840)=""/220, 0xdc}], 0x7, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpuacct.usage_percpu_sys\x00', 0x26e1, 0x0) write$cgroup_int(r9, &(0x7f0000000080), 0x15d4b87) ioctl$EXT4_IOC_SETFLAGS(r9, 0x401c5820, &(0x7f0000000180)=0x18) ioctl$KVM_SET_IRQCHIP(r9, 0x8208ae63, &(0x7f00000009c0)={0x1, 0x0, @ioapic={0xf893625ccbf06aa8, 0x3, 0x80, 0x8, 0x0, [{0x26, 0x80, 0x4, [], 0xb7}, {0x9, 0x8, 0x36, [], 0x48}, {0x2, 0x7f, 0xff, [], 0xff}, {0x0, 0x1, 0x1, [], 0x5}, {0x9, 0x0, 0x1f, [], 0x30}, {0x2, 0x7, 0x40, [], 0x9}, {0xff, 0x8, 0x2, [], 0x4}, {0x0, 0x7, 0xc6, [], 0x7}, {0x7, 0x4, 0x9, [], 0xff}, {0x0, 0x80, 0x1, [], 0xdb}, {0x5, 0x0, 0x4, [], 0xc4}, {0x2, 0xff, 0x6}, {0x1, 0x6, 0x1, [], 0x4}, {0xff, 0x8, 0x48, [], 0x4}, {0x6, 0xae, 0x80, [], 0x20}, {0x9, 0x3, 0x8, [], 0x1}, {0x1, 0x5, 0x1, [], 0x7}, {0x2, 0xb, 0x7f, [], 0x3f}, {0xff, 0x4, 0x1, [], 0x1}, {0x7f, 0x6, 0x55, [], 0x7}, {0xff, 0x1, 0x2, [], 0x40}, {0x0, 0xff, 0x20, [], 0x7f}, {0x6, 0x6, 0x7, [], 0x80}, {0x4, 0x7f, 0x5, [], 0x5}]}}) getpgid(r8) wait4(r7, &(0x7f0000000000), 0x8, &(0x7f0000000040)) 06:43:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f00000000c0)={'syz'}, &(0x7f0000000900)="585ccbc4ed83b836c1a6474914dc5500b66147b3c7218a91690000000042e3d35228897501f93191b076ac446ff0022b8753a1fa74ff569f435fb3bae96efb74b50ec93c2db8eae3198a29e5c0cfc60000ce0637cef580b4ec24c53d86571ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff33c1e8e036e5031949762d009d308bd73f477252d0000000000004000000000000000000000000000000000195e23", 0x395, r0) r2 = add_key$user(&(0x7f0000000200)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000000)={r2, r1, r2}, &(0x7f0000000700)=""/243, 0x356, &(0x7f0000000040)={&(0x7f0000000580)={'poly1305-simd\x00\x0f\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x02\x00\x00\x00\x0f\x00@\x00\x00\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000180)}) add_key$user(&(0x7f0000000200)='user\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) [ 909.186489][ T9025] kasan: CONFIG_KASAN_INLINE enabled [ 909.191856][ T9025] kasan: GPF could be caused by NULL-ptr deref or user memory access