(0x7f0000000040)={0x0, 0x1}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r4, 0x84, 0x0, &(0x7f0000000140)={r5, 0x3, 0x8, 0x4}, 0x10) 15:50:36 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 915.231507][T32635] loop1: p1 15:50:36 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000200000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:36 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 915.262379][T32636] loop2: p1 [ 915.265620][T32636] loop2: partition table partially beyond EOD, truncated [ 915.272934][T32636] loop2: p1 start 1 is beyond EOD, truncated 15:50:36 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000100000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:36 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000000fffffffe000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:36 executing program 3: r0 = add_key$keyring(&(0x7f0000000140)='keyring\x00', &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000200)="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", 0xfa, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r1, r1}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:50:36 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000000000000000000003f0000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:36 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 915.513071][T32663] loop5: p1 15:50:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x2, &(0x7f0000000300), 0x10) r1 = syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0x2, 0x2) ioctl$TIOCMBIS(r1, 0x5416, &(0x7f0000000340)=0x1ff) r2 = request_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000140)='cpuset]#lokeyring/$\x00', 0xfffffffffffffffa) r3 = add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000480)={'syz'}, &(0x7f0000000600)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a70bfdd824776d493fbdde99caa3d71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c5343d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xce, r2) r4 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r4, r3, r3}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:50:36 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:36 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000040200000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 915.656757][T32673] loop1: p1 15:50:36 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 915.710727][T32667] loop4: p1 15:50:36 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x20800, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585cc9e4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r1, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:50:36 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000400000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:36 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:36 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000021000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 915.846759][T32681] loop2: p1 [ 915.849998][T32681] loop2: partition table partially beyond EOD, truncated [ 915.857457][T32681] loop2: p1 start 1 is beyond EOD, truncated 15:50:36 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000fff000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:36 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:36 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x12080, 0x0) ioctl$KVM_INTERRUPT(r1, 0x4004ae86, &(0x7f0000000080)=0x7) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000540)={0xffffffffffffffff}, 0x117, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000740)={0x15, 0x110, 0xfa00, {r4, 0x8, 0x0, 0x0, 0x0, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1a}}, @ib={0x1b, 0x2, 0x3, {"a3a9ddcc98c408f9c98ece350320bdb7"}, 0x100, 0x200, 0x4}}}, 0x118) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f0000000480)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x3}, 0xc, &(0x7f0000000440)={&(0x7f0000000280)={0xc8, r5, 0x300, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e21}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xe187}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}]}, @IPVS_CMD_ATTR_DAEMON={0x74, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'erspan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_bond\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x8a4b}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'lapb0\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x1}]}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0xc8}, 0x1, 0x0, 0x0, 0x80}, 0x0) r6 = getpgid(0xffffffffffffffff) r7 = getpgid(r6) write$P9_RGETLOCK(r2, &(0x7f00000004c0)={0x21, 0x37, 0x2, {0x3, 0x6, 0x1, r7, 0x3, '-,-'}}, 0x21) add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) bind$tipc(r1, &(0x7f0000000500)=@id={0x1e, 0x3, 0x3, {0x4e20, 0x1}}, 0x10) keyctl$dh_compute(0x17, &(0x7f0000000580)={r3, r3, r3}, &(0x7f0000000940)=""/243, 0x12c, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000a40)="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"}) 15:50:37 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 916.072455][T32703] loop5: p1 [ 916.138539][T32700] loop1: p1 15:50:37 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 916.232471][T32702] loop4: p1 [ 916.291656][T32719] print_req_error: 767 callbacks suppressed [ 916.291668][T32719] blk_update_request: I/O error, dev loop1, sector 1 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 916.309552][ T2515] blk_update_request: I/O error, dev loop1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 916.320467][ T2515] buffer_io_error: 766 callbacks suppressed [ 916.320475][ T2515] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 916.334575][ T2515] blk_update_request: I/O error, dev loop1, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 916.345464][ T2515] Buffer I/O error on dev loop1p1, logical block 1, async page read [ 916.353512][ T2515] blk_update_request: I/O error, dev loop1, sector 3 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 916.364400][ T2515] Buffer I/O error on dev loop1p1, logical block 2, async page read [ 916.372445][ T2515] blk_update_request: I/O error, dev loop1, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 916.372996][T32700] __loop_clr_fd: partition scan of loop1 failed (rc=-16) [ 916.383330][ T2515] Buffer I/O error on dev loop1p1, logical block 3, async page read [ 916.383368][ T2515] blk_update_request: I/O error, dev loop1, sector 5 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 916.383380][ T2515] Buffer I/O error on dev loop1p1, logical block 4, async page read [ 916.383420][ T2515] blk_update_request: I/O error, dev loop1, sector 6 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 916.428176][ T2515] Buffer I/O error on dev loop1p1, logical block 5, async page read [ 916.436243][ T2515] blk_update_request: I/O error, dev loop1, sector 7 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 916.447121][ T2515] Buffer I/O error on dev loop1p1, logical block 6, async page read [ 916.455184][ T2515] blk_update_request: I/O error, dev loop1, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 916.466068][ T2515] Buffer I/O error on dev loop1p1, logical block 7, async page read [ 916.474984][ T2515] blk_update_request: I/O error, dev loop1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 15:50:37 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000300000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:37 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 916.486568][ T2515] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 916.494642][ T2515] Buffer I/O error on dev loop1p1, logical block 1, async page read 15:50:37 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 916.582931][T32723] loop2: p1 [ 916.586203][T32723] loop2: partition table partially beyond EOD, truncated [ 916.593524][T32723] loop2: p1 start 1 is beyond EOD, truncated 15:50:37 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000000000000000000005c0000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:37 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000002000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:37 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 916.757529][T32730] loop5: p1 15:50:37 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000000000000ffff000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:37 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000400000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:37 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 916.977522][T32738] loop1: p1 [ 917.033180][T32741] loop4: p1 [ 917.072830][T32738] __loop_clr_fd: partition scan of loop1 failed (rc=-16) 15:50:38 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:38 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x440, 0x0) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$IP_VS_SO_GET_INFO(r2, 0x0, 0x481, &(0x7f0000000240), &(0x7f0000000280)=0xc) syz_open_dev$binder(&(0x7f0000000300)='/dev/binder#\x00', 0x0, 0x2) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x101000, 0x0) sync_file_range(r0, 0x8000, 0xfffffffffffff385, 0x7) ioctl$SIOCAX25GETUID(r2, 0x89e0, &(0x7f0000000200)={0x3, @bcast, r3}) r5 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) r6 = syz_genetlink_get_family_id$team(&(0x7f0000000440)='team\x00') ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000480)={'ifb0\x00', 0x0}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000600)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000640)=0x14) accept$packet(r0, &(0x7f0000000680)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000006c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000840)={@loopback, @empty, 0x0}, &(0x7f0000000880)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000005240)={{{@in=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast2}}, &(0x7f0000005340)=0xe8) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f00000053c0)={0x0, @empty, @multicast1}, &(0x7f0000005400)=0xc) getsockname$packet(r2, &(0x7f0000005440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000005480)=0x14) getpeername$packet(r2, &(0x7f00000054c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000005500)=0x14) accept4$packet(r2, &(0x7f0000005540)={0x11, 0x0, 0x0}, &(0x7f0000005580)=0x14, 0x80000) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000005e00)={'veth1_to_bridge\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000005f40)={'team0\x00', 0x0}) recvmsg$kcm(r2, &(0x7f0000008940)={&(0x7f0000008640)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f00000088c0)=[{&(0x7f00000086c0)=""/214, 0xd6}, {&(0x7f00000087c0)=""/62, 0x3e}, {&(0x7f0000008800)=""/139, 0x8b}], 0x3, &(0x7f0000008900)=""/17, 0x11}, 0x2020) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000008980)={{{@in, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@dev}}, &(0x7f0000008a80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000008b00)={{{@in=@dev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6}}, &(0x7f0000008c00)=0xe8) accept4$packet(r4, &(0x7f0000008c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000008c80)=0x14, 0x800) recvmsg(r2, &(0x7f0000009ec0)={&(0x7f0000008cc0)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000009e40)=[{&(0x7f0000008d40)=""/72, 0x48}, {&(0x7f0000008dc0)=""/107, 0x6b}, {&(0x7f0000008e40)=""/4096, 0x1000}], 0x20d, &(0x7f0000009e80)=""/45, 0x2d}, 0x100) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000009f00)={{{@in=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@initdev}}, &(0x7f000000a000)=0xe8) getsockopt$inet_mreqn(r2, 0x0, 0x24, &(0x7f000000a040)={@dev, @broadcast, 0x0}, &(0x7f000000a080)=0xc) sendmsg$TEAM_CMD_OPTIONS_GET(r2, &(0x7f000000a8c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f000000a880)={&(0x7f00000008c0)=ANY=[@ANYBLOB="b4070000", @ANYRES16=r6, @ANYBLOB="030129bd7000fedbdf250200000008000100", @ANYRES32=r7, @ANYBLOB="f800020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e00000008000400ffffff7f08000600", @ANYRES32=r8, @ANYBLOB="3c00010024000100656e61626c656400000000000000000000000000000000000000000000008000080003000600000004000400080006001ee3b5065cc25ab05abe58f118667c6e752e49756637a14c51a66faa981f52746c0dd34d1676fcb370d6e04745d1bdaa1694dde8f3dae678df9e5ddfe96aba6ae1cae1ca3185e6ac98e077e66c853b08dc6db61d504009a1ba077db9d376b9e484307730bbde02134d4080b4aeeb6c2cdfea42c1e9da0719866b45ae4e54e3d05e41d04eccadc42d19abcc073505da000f42b0e8ba89779005f73c38ffc39beff58912c645143f5cb0f45101b956a1", @ANYRES32=r9, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040002000000080007000000000038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000400000008000100", @ANYRES32=r10, @ANYBLOB="b800020038000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400040000003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b00000008000400a2020000080007000000000008000100", @ANYRES32=r11, @ANYBLOB="3c00020038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000200000008000100", @ANYRES32=r12, @ANYBLOB="3c01020038000100240001006e6f746966795f70656572735f696e74657276616c0000000000000000000000080003000300000008000400010000004c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e67000000003800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r13, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r14, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040047a4e649080007000000000008000100", @ANYRES32=r15, @ANYBLOB="b400020038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000080003000300000008000400fb72a81940000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040006000000080007000000000008000100", @ANYRES32=r16, @ANYBLOB="ac0102003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r17, @ANYBLOB="40000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r18, @ANYBLOB="080007000000000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040001000000080007000000000038000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000080003000300000008000400000400003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r19, @ANYBLOB="3c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c00040068617368000000003c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000000c000400ffff02003f00000008000100", @ANYRES32=r20, @ANYBLOB="e00102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r21, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r22, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400ff07000038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000400000038000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000080003000300000008000400090000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r23, @ANYBLOB="40000100240001006d6f64650000000000000000000000000000000000000000000000000000000008000300050000001000040062726f61646361737400000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r24, @ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x7b4}, 0x1, 0x0, 0x0, 0x24008895}, 0x4008000) keyctl$dh_compute(0x17, &(0x7f0000000580)={r5, r1, r1}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:50:38 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000004200000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:38 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000001000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:38 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 917.236130][T32746] loop2: p1 [ 917.239429][T32746] loop2: partition table partially beyond EOD, truncated [ 917.246759][T32746] loop2: p1 start 1 is beyond EOD, truncated [ 917.261371][T32752] loop5: p1 15:50:38 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000500000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:38 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000000007fffffff000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:38 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r1, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x20000, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r2, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x1c, r3, 0x0, 0x70bd2c, 0x25dfdbfd, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x41}, 0x20048854) [ 917.503435][ T307] loop1: p1 p2 [ 917.611048][ T305] loop4: p1 15:50:38 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:38 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000009000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:38 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000002000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:38 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000002c0)="7ed7f9435cf4b8ea92b542f8429e254d9bfada304419f3c5483175d54cf12d66228cf4cc3fc0ee2bd8ac36a5b7ee7292891d730caf626353c2afa1f58286de57fe1323a9a1a881595c8c939fadfbcf42c612cbaa8b606ba5d8e4d84548d52d14f0f01a62d6e883d23e653cafe03d9a310fb9f780f22819a83e8cccc3f435fbcba16678c8e71e92af438a7659fc415e010aa5075a4ca48ac5e9d75f1b296722c8", 0xa0, 0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000000)={'syz', 0x1}, &(0x7f0000000440)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x1e5, r0) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r1, r1}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) [ 917.790855][ T320] loop5: p1 [ 917.832475][ T319] loop2: p1 [ 917.835820][ T319] loop2: partition table partially beyond EOD, truncated [ 917.843547][ T319] loop2: p1 start 1 is beyond EOD, truncated 15:50:38 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 917.919030][ T344] encrypted_key: insufficient parameters specified 15:50:38 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000000ffffffff000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 917.960457][ T348] encrypted_key: insufficient parameters specified [ 917.982506][ T339] loop1: p1 p2 15:50:38 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000600000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 918.052823][ T338] loop4: p1 [ 918.107501][ T339] __loop_clr_fd: partition scan of loop1 failed (rc=-16) 15:50:39 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:39 executing program 3: r0 = socket$kcm(0x29, 0x5, 0x0) recvmsg$kcm(r0, &(0x7f00000087c0)={0x0, 0x0, 0x0}, 0x0) 15:50:39 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000003000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:39 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000001000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:39 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 918.361702][ T358] loop2: p1 [ 918.365043][ T358] loop2: partition table partially beyond EOD, truncated [ 918.372309][ T358] loop2: p1 start 1 is beyond EOD, truncated 15:50:39 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:39 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 918.465047][ T362] loop5: p1 [ 918.506681][ T369] loop1: p1 p2 15:50:39 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 918.564081][ T371] loop4: p1 15:50:39 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000007ffffffffffff000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:39 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000004000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:39 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:39 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000040600000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:39 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000002000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 918.847825][ T389] Dev loop2: unable to read RDB block 1 [ 918.853612][ T389] loop2: unable to read partition table [ 918.859302][ T389] loop2: partition table beyond EOD, truncated [ 918.865587][ T389] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 918.937859][ T396] loop1: p1 p2 [ 919.054625][ T401] loop5: p1 [ 919.107953][ T402] loop4: p1 15:50:40 executing program 3: 15:50:40 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07007fffffffffffffff000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:40 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000700000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:40 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:40 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000005000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:40 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000402000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:40 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x2}) 15:50:40 executing program 3: [ 919.334763][ T421] loop5: p1 15:50:40 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000800000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:40 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03', 0x2}) 15:50:40 executing program 3: 15:50:40 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04', 0x2}) [ 919.423320][ T423] loop1: p1 p2 15:50:40 executing program 3: 15:50:40 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05', 0x2}) [ 919.512270][ T428] Dev loop2: unable to read RDB block 1 [ 919.517976][ T428] loop2: unable to read partition table [ 919.523736][ T428] loop2: partition table beyond EOD, truncated [ 919.529907][ T428] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 15:50:40 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700ffffffffffffffff000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:40 executing program 3: [ 919.671968][ T429] loop4: p1 15:50:40 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000006000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:40 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06', 0x2}) 15:50:40 executing program 3: 15:50:40 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000003000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 919.794032][ T452] loop5: p1 15:50:40 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000900000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:40 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x80000000141047, 0x0) close(r0) r1 = syz_open_dev$loop(&(0x7f0000000540)='/dev/loop#\x00', 0x0, 0x105082) r2 = memfd_create(&(0x7f0000000300)='4t\xb9L<\xf2\x00\x90\xcd\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r2, &(0x7f0000000440)=[{&(0x7f0000000480)="a8", 0x1}], 0x1, 0x81000) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800003, 0x11, r0, 0x0) write(r1, &(0x7f0000000000), 0x52698b21) 15:50:40 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a', 0x2}) [ 919.922125][ T462] Dev loop2: unable to read RDB block 1 [ 919.927834][ T462] loop2: unable to read partition table [ 919.933700][ T462] loop2: partition table beyond EOD, truncated [ 919.939895][ T462] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 15:50:40 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b', 0x2}) 15:50:40 executing program 3: r0 = socket(0x10, 0x3, 0x0) write(r0, &(0x7f00000000c0)="200000001a00010000000066835f7f081c000000000000000000000004000600", 0x20) [ 920.053228][ T461] loop1: p1 p2 [ 920.098151][ T470] loop4: p1 15:50:41 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000002000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:41 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t', 0x2}) 15:50:41 executing program 3: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f00000002c0)=0xe8) mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f00000004c0)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000280)=0x5, 0x4) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x20000000) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000500)={0x84, @rand_addr, 0x0, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x8f\x00\x00\x00\x00\x00 '}, 0x2c) poll(&(0x7f0000000440)=[{r1}], 0x1, 0x3ff) keyctl$join(0x1, 0x0) ioctl$PPPIOCSCOMPRESS(0xffffffffffffffff, 0x4010744d) syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x24044814) syz_emit_ethernet(0x36, &(0x7f0000000040)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0xb000000, 0x0, 0x28, 0x0, 0x0, 0x0, 0x82f, 0x0, @dev={0xac, 0x4}, @remote}, @icmp=@timestamp_reply}}}}, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000100)={0x28, r2, 0x11, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}]}]}, 0x28}}, 0x0) [ 920.245413][ T470] __loop_clr_fd: partition scan of loop4 failed (rc=-16) [ 920.285531][ T483] loop5: p1 15:50:41 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000007000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:41 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n', 0x2}) 15:50:41 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000004000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:41 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000a00000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:41 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\v', 0x2}) [ 920.481533][ T499] Dev loop2: unable to read RDB block 1 [ 920.487193][ T499] loop2: unable to read partition table [ 920.493088][ T499] loop2: partition table beyond EOD, truncated [ 920.499254][ T499] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 15:50:41 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f', 0x2}) 15:50:41 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000003000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:41 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\r', 0x2}) [ 920.673544][ T509] loop4: p1 15:50:41 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0e', 0x2}) 15:50:41 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000005000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 920.805196][ T514] loop5: p1 [ 920.812263][ T512] loop1: p1 p2 15:50:41 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000b00000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 920.892056][ T526] Dev loop2: unable to read RDB block 1 [ 920.897738][ T526] loop2: unable to read partition table [ 920.903632][ T526] loop2: partition table beyond EOD, truncated [ 920.909797][ T526] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 15:50:42 executing program 3: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f00000002c0)=0xe8) mkdirat(0xffffffffffffff9c, 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, &(0x7f00000004c0)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000280)=0x5, 0x4) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x20000000) setsockopt$IP_VS_SO_SET_ADD(r0, 0x0, 0x482, &(0x7f0000000500)={0x84, @rand_addr, 0x0, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x8f\x00\x00\x00\x00\x00 '}, 0x2c) poll(&(0x7f0000000440)=[{r1}], 0x1, 0x3ff) keyctl$join(0x1, 0x0) ioctl$PPPIOCSCOMPRESS(0xffffffffffffffff, 0x4010744d) syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x24044814) syz_emit_ethernet(0x36, &(0x7f0000000040)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0xb000000, 0x0, 0x28, 0x0, 0x0, 0x0, 0x82f, 0x0, @dev={0xac, 0x4}, @remote}, @icmp=@timestamp_reply}}}}, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000100)={0x28, r2, 0x11, 0x0, 0x0, {}, [@TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}]}]}, 0x28}}, 0x0) 15:50:42 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000008000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:42 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10', 0x2}) 15:50:42 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000004000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 921.083563][ T541] loop4: p1 15:50:42 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x11', 0x2}) [ 921.225914][ T545] loop5: p1 15:50:42 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000006000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:42 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x12', 0x2}) 15:50:42 executing program 3: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f00000002c0)=0xe8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x20000000) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000500)={0x84, @rand_addr, 0x0, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x8f\x00\x00\x00\x00\x00 '}, 0x2c) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x24044814) syz_emit_ethernet(0x36, &(0x7f0000000040)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0xb000000, 0x0, 0x28, 0x0, 0x0, 0x0, 0x82f, 0x0, @dev={0xac, 0x4}, @remote}, @icmp=@timestamp_reply}}}}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0x0) [ 921.352282][ T553] loop1: p1 p2 15:50:42 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070041a9e50b00000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:42 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1c', 0x2}) [ 921.433035][ T555] Dev loop2: unable to read RDB block 1 [ 921.438681][ T555] loop2: unable to read partition table [ 921.444474][ T555] loop2: partition table beyond EOD, truncated [ 921.450632][ T555] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 15:50:42 executing program 3: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f00000002c0)=0xe8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x20000000) setsockopt$IP_VS_SO_SET_ADD(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000500)={0x84, @rand_addr, 0x0, 0x0, 'mh\x00\x00\x00\x00\x00\x00\x00\x8f\x00\x00\x00\x00\x00 '}, 0x2c) sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, 0x0, 0x24044814) syz_emit_ethernet(0x36, &(0x7f0000000040)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0xb000000, 0x0, 0x28, 0x0, 0x0, 0x0, 0x82f, 0x0, @dev={0xac, 0x4}, @remote}, @icmp=@timestamp_reply}}}}, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(0xffffffffffffffff, 0x0, 0x0) 15:50:42 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000009000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:42 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000005000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:42 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00%', 0x2}) [ 921.592159][ T573] loop4: p1 15:50:42 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00pI\x00', 0x8}, 0x10) ioctl(r0, 0x8918, &(0x7f0000000000)) 15:50:42 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000406000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:42 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00:', 0x2}) 15:50:42 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000c00000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:42 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00pI\x00', 0x8}, 0x10) ioctl(r0, 0x8918, &(0x7f0000000000)) 15:50:42 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\\', 0x2}) [ 921.794903][ T589] Dev loop2: unable to read RDB block 1 [ 921.800564][ T589] loop2: unable to read partition table [ 921.806305][ T589] loop2: partition table beyond EOD, truncated [ 921.812744][ T589] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 921.882362][ T594] loop1: p1 p2 15:50:42 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:42 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00pI\x00', 0x8}, 0x10) ioctl(r0, 0x8918, &(0x7f0000000000)) 15:50:42 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000000000000000000000000000a000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:43 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000006000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 922.057981][ T606] loop5: p1 [ 922.062134][ T605] loop4: p1 15:50:43 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:43 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00pI\x00', 0x8}, 0x10) ioctl(r0, 0x8918, &(0x7f0000000000)) 15:50:43 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000d00000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:43 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000007000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:43 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000002c0)="7ed7f9435cf4b8ea92b542f8429e254d9bfada304419f3c5483175d54cf12d66228cf4cc3fc0ee2bd8ac36a5b7ee7292891d730caf626353c2afa1f58286de57fe1323a9a1a881595c8c939fadfbcf42c612cbaa8b606ba5d8e4d84548d52d14f0f01a62d6e883d23e653cafe03d9a310fb9f780f22819a83e8cccc3f435fbcba16678c8e71e92af438a7659fc415e010aa5075a4ca48ac5e9d75f1b296722c8", 0xa0, 0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000000)={'syz', 0x1}, &(0x7f0000000440)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x1e5, r0) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r1, r1}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) [ 922.342940][ T631] loop1: p1 p2 15:50:43 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 922.402336][ T632] Dev loop2: unable to read RDB block 1 [ 922.407976][ T632] loop2: unable to read partition table [ 922.413726][ T632] loop2: partition table beyond EOD, truncated [ 922.419889][ T632] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 15:50:43 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 922.478559][ T651] encrypted_key: insufficient parameters specified [ 922.486942][ T643] loop5: p1 15:50:43 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000002c0)="7ed7f9435cf4b8ea92b542f8429e254d9bfada304419f3c5483175d54cf12d66228cf4cc3fc0ee2bd8ac36a5b7ee7292891d730caf626353c2afa1f58286de57fe1323a9a1a881595c8c939fadfbcf42c612cbaa8b606ba5d8e4d84548d52d14f0f01a62d6e883d23e653cafe03d9a310fb9f780f22819a83e8cccc3f435fbcba16678c8e71e92af438a7659fc415e010aa5075a4ca48ac5e9d75f1b296722c8", 0xa0, 0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000000)={'syz', 0x1}, &(0x7f0000000440)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x1e5, r0) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r1, r1}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) [ 922.624413][ T644] loop4: p1 15:50:43 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000000000000000000000000000b000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:43 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:43 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700ca5e600d00000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:43 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000007000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 922.662917][ T666] encrypted_key: insufficient parameters specified 15:50:43 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000008000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r0 = add_key(&(0x7f0000000140)='encrypted\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000002c0)="7ed7f9435cf4b8ea92b542f8429e254d9bfada304419f3c5483175d54cf12d66228cf4cc3fc0ee2bd8ac36a5b7ee7292891d730caf626353c2afa1f58286de57fe1323a9a1a881595c8c939fadfbcf42c612cbaa8b606ba5d8e4d84548d52d14f0f01a62d6e883d23e653cafe03d9a310fb9f780f22819a83e8cccc3f435fbcba16678c8e71e92af438a7659fc415e010aa5075a4ca48ac5e9d75f1b296722c8", 0xa0, 0xffffffffffffffff) r1 = add_key$user(&(0x7f0000000500)='user\x00', &(0x7f0000000000)={'syz', 0x1}, &(0x7f0000000440)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0x1e5, r0) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r1, r1}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:50:43 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:43 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 922.893393][ T683] encrypted_key: insufficient parameters specified 15:50:43 executing program 3: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x7, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x12080, 0x0) ioctl$KVM_INTERRUPT(r1, 0x4004ae86, &(0x7f0000000080)=0x7) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000600)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000540)={0xffffffffffffffff}, 0x117, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r1, &(0x7f0000000740)={0x15, 0x110, 0xfa00, {r4, 0x8, 0x0, 0x0, 0x0, @in={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x1a}}, @ib={0x1b, 0x2, 0x3, {"a3a9ddcc98c408f9c98ece350320bdb7"}, 0x100, 0x200, 0x4}}}, 0x118) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f0000000480)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x3}, 0xc, &(0x7f0000000440)={&(0x7f0000000280)={0xc8, r5, 0x300, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e21}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xe187}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}]}, @IPVS_CMD_ATTR_DAEMON={0x74, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'rose0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'erspan0\x00'}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_bond\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x8a4b}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'lapb0\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x1}]}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x6}]}, 0xc8}, 0x1, 0x0, 0x0, 0x80}, 0x0) r6 = getpgid(0xffffffffffffffff) r7 = getpgid(r6) write$P9_RGETLOCK(r2, &(0x7f00000004c0)={0x21, 0x37, 0x2, {0x3, 0x6, 0x1, r7, 0x3, '-,-'}}, 0x21) add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) bind$tipc(r1, &(0x7f0000000500)=@id={0x1e, 0x3, 0x3, {0x4e20, 0x1}}, 0x10) keyctl$dh_compute(0x17, &(0x7f0000000580)={r3, r3, r3}, &(0x7f0000000940)=""/243, 0x12c, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000a40)="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"}) 15:50:43 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:43 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:43 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 923.042381][ T676] loop1: p1 p2 [ 923.060514][ T674] Dev loop2: unable to read RDB block 1 [ 923.066318][ T674] loop2: unable to read partition table [ 923.072019][ T674] loop2: partition table beyond EOD, truncated [ 923.078194][ T674] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 923.127655][ T678] loop4: p1 15:50:44 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000000000000000000000000000c000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:44 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000e00000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:44 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:44 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000008000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:44 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000009000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:44 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:44 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 923.482422][ T705] loop5: p1 [ 923.543984][ T714] loop1: p1 p2 [ 923.670223][ T716] loop4: p1 15:50:44 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000000000000000000000000000d000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 923.862908][ T722] Dev loop2: unable to read RDB block 1 [ 923.868967][ T722] loop2: unable to read partition table [ 923.875382][ T722] loop2: partition table beyond EOD, truncated [ 923.881592][ T722] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 924.022922][ T737] loop1: p1 p2 [ 924.089322][ T740] print_req_error: 3098 callbacks suppressed [ 924.089334][ T740] blk_update_request: I/O error, dev loop1, sector 1 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 924.109433][ T2516] blk_update_request: I/O error, dev loop1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 924.114891][ T737] __loop_clr_fd: partition scan of loop1 failed (rc=-16) [ 924.120678][ T2516] buffer_io_error: 3094 callbacks suppressed [ 924.120686][ T2516] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 924.141511][ T2516] blk_update_request: I/O error, dev loop1, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 924.152580][ T2516] Buffer I/O error on dev loop1p1, logical block 1, async page read [ 924.160588][ T2516] blk_update_request: I/O error, dev loop1, sector 3 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 924.171480][ T2516] Buffer I/O error on dev loop1p1, logical block 2, async page read 15:50:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r0, 0x28, 0x2, &(0x7f0000000300), 0x10) r1 = syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0x2, 0x2) ioctl$TIOCMBIS(r1, 0x5416, &(0x7f0000000340)=0x1ff) r2 = request_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000140)='cpuset]#lokeyring/$\x00', 0xfffffffffffffffa) r3 = add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000480)={'syz'}, &(0x7f0000000600)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a70bfdd824776d493fbdde99caa3d71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c5343d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xce, r2) r4 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r4, r3, r3}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:50:45 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:45 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000001000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:45 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000000000000000a000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:45 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000009000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 924.179483][ T2516] blk_update_request: I/O error, dev loop1, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 924.190386][ T2516] Buffer I/O error on dev loop1p1, logical block 3, async page read [ 924.198437][ T2516] blk_update_request: I/O error, dev loop1, sector 5 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 924.209364][ T2516] Buffer I/O error on dev loop1p1, logical block 4, async page read [ 924.217414][ T2516] blk_update_request: I/O error, dev loop1, sector 6 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 924.228375][ T2516] Buffer I/O error on dev loop1p1, logical block 5, async page read [ 924.236410][ T2516] blk_update_request: I/O error, dev loop1, sector 7 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 924.247299][ T2516] Buffer I/O error on dev loop1p1, logical block 6, async page read [ 924.255334][ T2516] blk_update_request: I/O error, dev loop1, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 924.266264][ T2516] Buffer I/O error on dev loop1p1, logical block 7, async page read [ 924.275973][ T2516] blk_update_request: I/O error, dev loop1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 924.286999][ T2516] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 924.295080][ T2516] Buffer I/O error on dev loop1p1, logical block 1, async page read 15:50:45 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000000000000000000000000000e000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:45 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x40, 0x224940) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r1, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x8, 'queue1\x00', 0x100}) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = msgget$private(0x0, 0x402) msgsnd(r4, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(r3, 0x5601, 0x0) [ 924.466801][ T746] loop4: p1 15:50:45 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:45 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff', 0x2}) [ 924.599528][ T747] Dev loop2: unable to read RDB block 1 [ 924.605253][ T747] loop2: unable to read partition table [ 924.611029][ T747] loop2: partition table beyond EOD, truncated [ 924.611057][ T747] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 924.611659][ T756] loop5: p1 15:50:45 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe', 0x2}) 15:50:45 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000000000000000b000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x40, 0x224940) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r1, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x8, 'queue1\x00', 0x100}) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = msgget$private(0x0, 0x402) msgsnd(r4, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(r3, 0x5601, 0x0) [ 924.689695][ T768] loop1: p1 p2 15:50:45 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:45 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000001100000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:45 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:45 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000a000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:45 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000010000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x40, 0x224940) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r1, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x8, 'queue1\x00', 0x100}) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = msgget$private(0x0, 0x402) msgsnd(r4, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(r3, 0x5601, 0x0) 15:50:45 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 925.012017][ T788] loop4: p1 15:50:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x40, 0x224940) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r1, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x8, 'queue1\x00', 0x100}) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) pipe(&(0x7f0000000080)) r3 = msgget$private(0x0, 0x402) msgsnd(r3, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) 15:50:46 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:46 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000000000000000c000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 925.131978][ T801] loop5: p1 15:50:46 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:46 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000001200000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x40, 0x224940) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r1, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x8, 'queue1\x00', 0x100}) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) pipe(&(0x7f0000000080)) r3 = msgget$private(0x0, 0x402) msgsnd(r3, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) [ 925.261194][ T800] Dev loop2: unable to read RDB block 1 [ 925.262196][ T803] loop1: p1 p2 [ 925.266853][ T800] loop2: unable to read partition table [ 925.276135][ T800] loop2: partition table beyond EOD, truncated [ 925.282324][ T800] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 15:50:46 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:46 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000b000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x40, 0x224940) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r1, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x8, 'queue1\x00', 0x100}) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) pipe(&(0x7f0000000080)) r3 = msgget$private(0x0, 0x402) msgsnd(r3, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) [ 925.512961][ T824] loop5: p1 15:50:46 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000011000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:46 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 925.608758][ T819] loop4: p1 15:50:46 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000001400000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x40, 0x224940) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r1, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x8, 'queue1\x00', 0x100}) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) msgsnd(0x0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(r3, 0x5601, 0x0) 15:50:46 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000000000000000d000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:46 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x40, 0x224940) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r1, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x8, 'queue1\x00', 0x100}) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) msgsnd(0x0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(r3, 0x5601, 0x0) [ 925.801515][ T838] Dev loop2: unable to read RDB block 1 [ 925.807332][ T838] loop2: unable to read partition table [ 925.813062][ T838] loop2: partition table beyond EOD, truncated [ 925.819229][ T838] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 15:50:46 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 925.951990][ T849] loop1: p1 p2 15:50:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x40, 0x224940) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r1, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x8, 'queue1\x00', 0x100}) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) msgsnd(0x0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(r3, 0x5601, 0x0) 15:50:46 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 925.981977][ T847] loop5: p1 15:50:46 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000c000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:47 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 926.155839][ T853] loop4: p1 15:50:47 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000012000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:47 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000001f00000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x40, 0x224940) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r1, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x8, 'queue1\x00', 0x100}) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) r3 = msgget$private(0x0, 0x402) msgsnd(r3, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:50:47 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000000ca5e600d000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:47 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x40, 0x224940) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r1, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x8, 'queue1\x00', 0x100}) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) r3 = msgget$private(0x0, 0x402) msgsnd(r3, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:50:47 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 926.406736][ T881] Dev loop2: unable to read RDB block 1 [ 926.412442][ T881] loop2: unable to read partition table [ 926.418135][ T881] loop2: partition table beyond EOD, truncated [ 926.424479][ T881] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 15:50:47 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 926.483749][ T885] loop5: p1 15:50:47 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 926.613379][ T886] loop1: p1 p2 15:50:47 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:47 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000d000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 926.674996][ T896] loop4: p1 15:50:47 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000002000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:47 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000020000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x40, 0x224940) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r1, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x8, 'queue1\x00', 0x100}) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) r3 = msgget$private(0x0, 0x402) msgsnd(r3, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:50:47 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000000000000000e000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:47 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x40, 0x224940) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x8, 'queue1\x00', 0x100}) add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffd) r1 = msgget$private(0x0, 0x402) msgsnd(r1, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) [ 926.941756][ T922] loop5: p1 15:50:47 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:47 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x40, 0x224940) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x8, 'queue1\x00', 0x100}) add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffd) r1 = msgget$private(0x0, 0x402) msgsnd(r1, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) [ 927.013823][ T922] __loop_clr_fd: partition scan of loop5 failed (rc=-16) 15:50:48 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 927.073281][ T927] loop1: p1 p2 [ 927.119974][ T930] loop4: p1 15:50:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x40, 0x224940) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x8, 'queue1\x00', 0x100}) r1 = msgget$private(0x0, 0x402) msgsnd(r1, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) [ 927.185270][ T923] Dev loop2: unable to read RDB block 1 [ 927.190926][ T923] loop2: unable to read partition table [ 927.196612][ T923] loop2: partition table beyond EOD, truncated [ 927.202811][ T923] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 15:50:48 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000e000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:48 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:48 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000002500000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:48 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000025000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:48 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000010000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x40, 0x224940) r0 = msgget$private(0x0, 0x402) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:50:48 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:48 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x40, 0x224940) r0 = msgget$private(0x0, 0x402) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:50:48 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 927.567471][ T968] loop5: p1 15:50:48 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:48 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 927.702092][ T971] loop1: p1 p2 [ 927.753141][ T962] Dev loop2: unable to read RDB block 1 [ 927.758838][ T962] loop2: unable to read partition table [ 927.764575][ T962] loop2: partition table beyond EOD, truncated [ 927.770733][ T962] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 927.781991][ T964] loop4: p1 [ 927.824739][ T968] __loop_clr_fd: partition scan of loop5 failed (rc=-16) 15:50:48 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000010000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x40, 0x224940) r0 = msgget$private(0x0, 0x402) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:50:48 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:48 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000000000000000000000000003f000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:48 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000011000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:48 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000003f00000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x8, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x402) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:50:49 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x8, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x402) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:50:49 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 928.152005][ T1007] Dev loop2: unable to read RDB block 1 [ 928.157663][ T1007] loop2: unable to read partition table [ 928.163419][ T1007] loop2: partition table beyond EOD, truncated [ 928.169572][ T1007] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 15:50:49 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 928.244364][ T1010] loop4: p1 [ 928.285681][ T1013] loop1: p1 p2 [ 928.315217][ T1011] loop5: p1 15:50:49 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:49 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000011000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x8, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x402) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:50:49 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:49 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000040000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:49 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000004000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:49 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:49 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000012000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x8, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x402) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:50:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x8, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x402) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:50:49 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 928.652049][ T1048] Dev loop2: unable to read RDB block 1 [ 928.657712][ T1048] loop2: unable to read partition table [ 928.663531][ T1048] loop2: partition table beyond EOD, truncated [ 928.669692][ T1048] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 15:50:49 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:49 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 928.891795][ T1058] loop5: p1 [ 928.913561][ T1052] loop1: p1 p2 15:50:49 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000012000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x8, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x402) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:50:49 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000be5a94100000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:49 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000000000000000000000000005c000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:49 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:49 executing program 3: add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x8, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x402) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) [ 929.041971][ T1078] loop4: p1 15:50:50 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000014000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:50 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:50 executing program 3: add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x8, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x402) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:50:50 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:50 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 929.301347][ T1091] Dev loop2: unable to read RDB block 1 [ 929.307000][ T1091] loop2: unable to read partition table [ 929.313141][ T1091] loop2: partition table beyond EOD, truncated [ 929.319305][ T1091] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 15:50:50 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 929.399076][ T1104] loop1: p1 p2 15:50:50 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000014000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:50 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000004200000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:50 executing program 3: add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x8, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x402) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:50:50 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000020000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:50 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 929.568718][ T1115] loop4: p1 15:50:50 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x8, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x402) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:50:50 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000000000000001f000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:50 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:50 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x8, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x402) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) [ 929.702308][ T1129] loop5: p1 15:50:50 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x8, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x402) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:50:50 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:50 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000f4300000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 929.836320][ T1135] Dev loop2: unable to read RDB block 1 [ 929.842030][ T1135] loop2: unable to read partition table [ 929.848217][ T1135] loop2: partition table beyond EOD, truncated [ 929.854595][ T1135] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 929.939638][ T1137] loop1: p1 [ 929.993962][ T1143] loop4: p1 15:50:51 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000025000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:51 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x8, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x402) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) [ 930.194215][ T1162] loop5: p1 15:50:51 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000030000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:51 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x8, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x402) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:50:51 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000020000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:51 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000004800000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:51 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x8, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x402) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) [ 930.444483][ T1176] Dev loop2: unable to read RDB block 1 [ 930.450115][ T1176] loop2: unable to read partition table [ 930.456058][ T1176] loop2: partition table beyond EOD, truncated [ 930.462295][ T1176] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 15:50:51 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x8, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x402) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) [ 930.502898][ T1184] loop1: p1 [ 930.537786][ T1187] loop4: p1 [ 930.708874][ T1193] loop5: p1 15:50:51 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000042000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:51 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x8, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x402) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:50:51 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000040000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:51 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000004c00000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:51 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000025000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x8, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x402) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:50:51 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x4}) 15:50:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x8, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x402) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:50:51 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 931.006004][ T1219] loop1: p1 [ 931.042693][ T1221] Dev loop2: unable to read RDB block 1 [ 931.048376][ T1221] loop2: unable to read partition table [ 931.054261][ T1221] loop2: partition table beyond EOD, truncated [ 931.060425][ T1221] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 15:50:52 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x8, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x402) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) [ 931.150450][ T1226] loop4: p1 15:50:52 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000048000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:52 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 931.201100][ T1224] loop5: p1 15:50:52 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000050000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:52 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000000000000003f000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:52 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000005c00000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x8, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x402) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:50:52 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x8, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x402) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:50:52 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 931.517158][ T1257] loop4: p1 [ 931.564268][ T1255] Dev loop2: unable to read RDB block 1 [ 931.570032][ T1255] loop2: unable to read partition table [ 931.575876][ T1255] loop2: partition table beyond EOD, truncated [ 931.582217][ T1255] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 15:50:52 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 931.629816][ T1258] loop1: p1 15:50:52 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000040000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x8, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x402) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) [ 931.713660][ T1268] loop5: p1 15:50:52 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700004c000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:52 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:52 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000060000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:52 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:52 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000006000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x8, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x402) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:50:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x8, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x402) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:50:53 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 932.023888][ T1296] Dev loop2: unable to read RDB block 1 [ 932.029545][ T1296] loop2: unable to read partition table [ 932.035365][ T1296] loop2: partition table beyond EOD, truncated [ 932.041578][ T1296] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 932.112497][ T1292] loop4: p1 15:50:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x8, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x402) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:50:53 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 932.299226][ T1308] loop5: p1 [ 932.334294][ T1310] loop1: p1 15:50:53 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000000000be5a941000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:53 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:53 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700005c000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x8, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x402) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:50:53 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000070000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:53 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000006800000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x8, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x402) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:50:53 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 932.562086][ T1331] Dev loop2: unable to read RDB block 1 [ 932.567726][ T1331] loop2: unable to read partition table [ 932.573538][ T1331] loop2: partition table beyond EOD, truncated [ 932.579717][ T1331] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 15:50:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x8, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x402) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:50:53 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 932.684911][ T1341] loop4: p1 15:50:53 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 932.817315][ T1342] loop1: p1 15:50:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x8, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x402) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:50:53 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000042000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:53 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000060000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:53 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000080000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 932.911094][ T1349] loop5: p1 15:50:53 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000006c00000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:53 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x8, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x402) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:50:54 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 933.171960][ T1377] loop1: p1 15:50:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) r0 = msgget$private(0x0, 0x402) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) [ 933.230740][ T1375] loop4: p1 15:50:54 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:54 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000090000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:54 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000f43000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 933.324059][ T1385] loop5: p1 15:50:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) r0 = msgget$private(0x0, 0x402) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:50:54 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 933.377803][ T1378] Dev loop2: unable to read RDB block 1 [ 933.383695][ T1378] loop2: unable to read partition table [ 933.389380][ T1378] loop2: partition table beyond EOD, truncated [ 933.395591][ T1378] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 15:50:54 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000068000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:54 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:54 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000007400000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, 0x0) r0 = msgget$private(0x0, 0x402) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) [ 933.618799][ T1409] loop1: p1 15:50:54 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x0, 0x4, 0x8, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x402) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) [ 933.754672][ T1420] loop4: p1 15:50:54 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000000000000000000000a0000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x0, 0x4, 0x8, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x402) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:50:54 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 933.802764][ T1428] loop5: p1 [ 933.969526][ T1432] Dev loop2: unable to read RDB block 1 [ 933.975283][ T1432] loop2: unable to read partition table [ 933.981115][ T1432] loop2: partition table beyond EOD, truncated [ 933.987274][ T1432] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 15:50:54 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000048000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:54 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x0, 0x4, 0x8, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x402) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:50:55 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700006c000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:55 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000007a00000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:55 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 934.190842][ T1455] loop1: p1 15:50:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x0, 0x8, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x402) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:50:55 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000000000000000000000b0000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:55 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x0, 0x8, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x402) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:50:55 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 934.442681][ T1469] loop5: p1 15:50:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x0, 0x8, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x402) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) [ 934.528434][ T1481] loop1: p1 [ 934.651005][ T1468] loop4: p1 [ 934.664274][ T1474] Dev loop2: unable to read RDB block 1 [ 934.669932][ T1474] loop2: unable to read partition table [ 934.675741][ T1474] loop2: partition table beyond EOD, truncated [ 934.682067][ T1474] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 15:50:55 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000000000000004c000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:55 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:55 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700ffffff8000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:55 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000074000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:55 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000000000000000000000c0000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x0, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x402) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:50:55 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:55 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x0, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x402) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:50:55 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:55 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000028200000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:55 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 935.032697][ T1508] loop4: p1 15:50:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x0, 'queue1\x00'}) r0 = msgget$private(0x0, 0x402) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) [ 935.082211][ T1512] loop1: p1 [ 935.221940][ T1532] print_req_error: 2321 callbacks suppressed [ 935.221954][ T1532] blk_update_request: I/O error, dev loop1, sector 1 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 935.239685][ T1512] __loop_clr_fd: partition scan of loop1 failed (rc=-16) [ 935.247181][ T1531] blk_update_request: I/O error, dev loop4, sector 1 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 935.247422][ T2515] blk_update_request: I/O error, dev loop1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 935.261048][ T2516] blk_update_request: I/O error, dev loop4, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 935.269349][ T2515] buffer_io_error: 2318 callbacks suppressed [ 935.269357][ T2515] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 935.280158][ T2516] Buffer I/O error on dev loop4p1, logical block 0, async page read [ 935.286173][ T2515] blk_update_request: I/O error, dev loop1, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 935.294175][ T2516] blk_update_request: I/O error, dev loop4, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 935.302131][ T2515] Buffer I/O error on dev loop1p1, logical block 1, async page read [ 935.312984][ T2516] Buffer I/O error on dev loop4p1, logical block 1, async page read [ 935.323857][ T2515] blk_update_request: I/O error, dev loop1, sector 3 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 935.331837][ T2516] blk_update_request: I/O error, dev loop4, sector 3 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 935.339783][ T2515] Buffer I/O error on dev loop1p1, logical block 2, async page read [ 935.350650][ T2516] Buffer I/O error on dev loop4p1, logical block 2, async page read [ 935.361564][ T2515] blk_update_request: I/O error, dev loop1, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 935.369488][ T2516] blk_update_request: I/O error, dev loop4, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 935.377458][ T2515] Buffer I/O error on dev loop1p1, logical block 3, async page read [ 935.388306][ T2516] Buffer I/O error on dev loop4p1, logical block 3, async page read [ 935.399187][ T2515] Buffer I/O error on dev loop1p1, logical block 4, async page read [ 935.407162][ T2516] Buffer I/O error on dev loop4p1, logical block 4, async page read [ 935.415652][ T1508] __loop_clr_fd: partition scan of loop4 failed (rc=-16) [ 935.439594][ T1516] Dev loop2: unable to read RDB block 1 [ 935.445227][ T1516] loop2: unable to read partition table [ 935.450965][ T1516] loop2: partition table beyond EOD, truncated [ 935.457136][ T1516] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 935.482720][ T1540] loop5: p1 15:50:56 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000000000000005c000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:56 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x0, 'queue1\x00'}) r0 = msgget$private(0x0, 0x402) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:50:56 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700007a000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:56 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000000000000000000000d0000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:56 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700ffffff8c00000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:56 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x0, 'queue1\x00'}) r0 = msgget$private(0x0, 0x402) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:50:56 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 935.846199][ T1555] loop4: p1 15:50:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x0, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:50:56 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000060000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:56 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 935.964184][ T1564] loop1: p1 15:50:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x0, 'queue1\x00', 0x100}) msgget$private(0x0, 0x0) msgsnd(0x0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:50:57 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:57 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700ffffff9700000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 936.152674][ T1571] Dev loop2: unable to read RDB block 1 [ 936.158353][ T1571] loop2: unable to read partition table [ 936.164139][ T1571] loop2: partition table beyond EOD, truncated [ 936.170301][ T1571] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 936.245320][ T1589] loop4: p1 15:50:57 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000090000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:57 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000000000000000000000e0000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x0, 'queue1\x00', 0x100}) msgget$private(0x0, 0x0) msgsnd(0x0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:50:57 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:57 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000068000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x0, 'queue1\x00', 0x100}) msgget$private(0x0, 0x0) msgsnd(0x0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:50:57 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700ffffffa100000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:57 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x0, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x0) msgsnd(r0, 0x0, 0x0, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) [ 936.632677][ T1608] loop1: p1 15:50:57 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 936.691904][ T1615] loop4: p1 15:50:57 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:57 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000100000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 936.834980][ T1620] Dev loop2: unable to read RDB block 1 [ 936.840632][ T1620] loop2: unable to read partition table [ 936.846452][ T1620] loop2: partition table beyond EOD, truncated [ 936.852654][ T1620] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 15:50:57 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000030000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:57 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:57 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000000000000006c000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x0, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x0) msgsnd(r0, 0x0, 0x0, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:50:57 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000002a200000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:58 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x0, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x0) msgsnd(r0, 0x0, 0x0, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) [ 937.101980][ T1645] loop1: p1 15:50:58 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:58 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000110000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 937.203293][ T1655] loop4: p1 15:50:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x0, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000200)={0x0, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:50:58 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 937.252906][ T1659] loop2: p1 [ 937.256199][ T1659] loop2: partition table partially beyond EOD, truncated [ 937.263530][ T1659] loop2: p1 start 1 is beyond EOD, truncated 15:50:58 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000050000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:58 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 937.418246][ T1654] loop5: p1 15:50:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x0, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000200)={0x0, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:50:58 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000074000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:58 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 937.537523][ T1682] loop1: p1 15:50:58 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700ffffffc900000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x0, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000200)={0x0, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:50:58 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000120000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:58 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 937.682225][ T1689] loop2: p1 [ 937.685522][ T1689] loop2: partition table partially beyond EOD, truncated [ 937.692769][ T1689] loop2: p1 start 1 is beyond EOD, truncated [ 937.763711][ T1691] loop4: p1 15:50:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x0, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000200)={0x1}, 0x8, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:50:58 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:58 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000060000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:58 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 937.973225][ T1707] loop1: p1 15:50:58 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000d605eca00000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:58 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000000000000007a000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:58 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x0, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000200)={0x1}, 0x8, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:50:59 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000250000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 938.142121][ T1723] loop2: p1 [ 938.145524][ T1723] loop2: partition table partially beyond EOD, truncated [ 938.152826][ T1723] loop2: p1 start 1 is beyond EOD, truncated 15:50:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x0, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000200)={0x1}, 0x8, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:50:59 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000070000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:59 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:59 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700ffffffe400000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 938.341466][ T1739] loop4: p1 15:50:59 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x0, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47ee"}, 0x10, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) [ 938.476233][ T1746] loop1: p1 15:50:59 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:59 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000080000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x0, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47ee"}, 0x10, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:50:59 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000000000000000000005c0000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 938.592781][ T1760] loop2: p1 [ 938.596089][ T1760] loop2: partition table partially beyond EOD, truncated [ 938.603376][ T1760] loop2: p1 start 1 is beyond EOD, truncated 15:50:59 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x0, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47ee"}, 0x10, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:50:59 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700ffffffeb00000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:59 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000090000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:50:59 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 938.875642][ T1785] loop4: p1 15:50:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x0, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242e"}, 0x14, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) [ 938.926607][ T1786] loop1: p1 15:50:59 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:50:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x0, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242e"}, 0x14, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:51:00 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:51:00 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000000ffffff80000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:00 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 939.100602][ T1813] loop2: p1 [ 939.104046][ T1813] loop2: partition table partially beyond EOD, truncated [ 939.111314][ T1813] loop2: p1 start 1 is beyond EOD, truncated 15:51:00 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700ffffffee00000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:00 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000300000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x0, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242e"}, 0x14, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:51:00 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:51:00 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000a0000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x0, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091"}, 0x16, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:51:00 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 939.405424][ T1834] loop4: p1 15:51:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x0, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091"}, 0x16, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:51:00 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:51:00 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 939.582761][ T1846] loop1: p1 15:51:00 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000000ffffff8c000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x0, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091"}, 0x16, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) [ 939.706511][ T1849] loop2: p1 [ 939.709787][ T1849] loop2: partition table partially beyond EOD, truncated [ 939.717242][ T1849] loop2: p1 start 1 is beyond EOD, truncated 15:51:00 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700fffffff600000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:00 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:51:00 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000500000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x0, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0"}, 0x17, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:51:00 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000b0000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:00 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 939.984122][ T1879] loop4: p1 15:51:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x0, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0"}, 0x17, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:51:00 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000000ffffff97000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:01 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:51:01 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:51:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x0, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091"}, 0x16, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) [ 940.192638][ T1889] loop1: p1 15:51:01 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 940.268833][ T1898] loop2: p1 [ 940.272195][ T1898] loop2: partition table partially beyond EOD, truncated [ 940.279374][ T1898] loop2: p1 start 1 is beyond EOD, truncated 15:51:01 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000020ff800000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x0, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef0"}, 0x15, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:51:01 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:51:01 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000600000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 940.462080][ T1910] loop4: p1 15:51:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x0, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef0"}, 0x15, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:51:01 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000c0000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:01 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000000ffffffa1000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:01 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:51:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x0, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef0"}, 0x15, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:51:01 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:51:01 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 940.774571][ T1929] loop1: p1 15:51:01 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700fffffdfd00000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x0, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091"}, 0x16, 0x0) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:51:01 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 940.933254][ T1944] loop4: p1 [ 940.943219][ T1940] loop2: p1 [ 940.946500][ T1940] loop2: partition table partially beyond EOD, truncated 15:51:01 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000700000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 940.980821][ T1940] loop2: p1 start 1 is beyond EOD, truncated 15:51:01 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:51:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x0, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef0"}, 0x15, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:51:02 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000d0000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:02 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000000000002a8000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:02 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:51:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x0, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091"}, 0x16, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:51:02 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700fffffffd00000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 941.306768][ T1976] loop1: p1 15:51:02 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:51:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x0, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091"}, 0x16, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) [ 941.395076][ T1981] loop4: p1 15:51:02 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:51:02 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:51:02 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000900000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 941.557744][ T1990] loop2: p1 [ 941.561187][ T1990] loop2: partition table partially beyond EOD, truncated [ 941.568406][ T1990] loop2: p1 start 1 is beyond EOD, truncated 15:51:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x0, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242e"}, 0x14, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:51:02 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000000000002aa000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:02 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700fffffffe00000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x8, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x402) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:51:02 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000e0000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:02 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 941.801499][ T2017] loop1: p1 15:51:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x8, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x402) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:51:02 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 941.902055][ T2021] loop4: p1 15:51:02 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000a00000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:02 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000000ffffffc9000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:02 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$user(0x0, 0x0, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x8, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x402) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:51:03 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 942.103595][ T2037] loop2: p1 [ 942.106924][ T2037] loop2: partition table partially beyond EOD, truncated [ 942.114467][ T2037] loop2: p1 start 1 is beyond EOD, truncated 15:51:03 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000fff00000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:03 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000430f0000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x8, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x402) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:51:03 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 942.280018][ T2051] loop1: p1 [ 942.304284][ T2055] loop4: p1 15:51:03 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:51:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x8, 'queue1\x00', 0x100}) r0 = msgget$private(0x0, 0x402) msgsnd(r0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:51:03 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:51:03 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000b00000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:03 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000000ffffffe4000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 942.443009][ T2068] Dev loop2: unable to read RDB block 1 [ 942.448669][ T2068] loop2: unable to read partition table [ 942.454517][ T2068] loop2: partition table beyond EOD, truncated [ 942.460675][ T2068] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 15:51:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x40, 0x224940) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x8, 'queue1\x00', 0x100}) r1 = msgget$private(0x0, 0x402) msgsnd(r1, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) [ 942.503140][ T2064] loop5: p1 15:51:03 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:51:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x40, 0x224940) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x8, 'queue1\x00', 0x100}) add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffd) r1 = msgget$private(0x0, 0x402) msgsnd(r1, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:51:03 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000020fff00000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:03 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000110000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:03 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 942.752553][ T2089] loop4: p1 15:51:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x40, 0x224940) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r1, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x8, 'queue1\x00', 0x100}) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) r3 = msgget$private(0x0, 0x402) msgsnd(r3, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) [ 942.777587][ T2086] loop1: p1 15:51:03 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:51:03 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000000ffffffeb000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:03 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000c00000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:03 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:51:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x40, 0x224940) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r1, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x8, 'queue1\x00', 0x100}) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) r3 = msgget$private(0x0, 0x402) msgsnd(r3, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(0xffffffffffffffff, 0x5601, 0x0) 15:51:03 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700ffffefff00000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 943.053783][ T2108] loop2: p1 [ 943.057103][ T2108] loop2: partition table partially beyond EOD, truncated [ 943.064398][ T2108] loop2: p1 start 1 is beyond EOD, truncated 15:51:04 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:51:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x40, 0x224940) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r1, 0xc08c5334, &(0x7f0000000100)={0x5, 0x4, 0x8, 'queue1\x00', 0x100}) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) msgsnd(0x0, &(0x7f0000000200)={0x1, "03c8a3baaf2e47eee3ce242ef091c0fb"}, 0x18, 0x800) ioctl$VIDIOC_RESERVED(r3, 0x5601, 0x0) [ 943.147081][ T2122] loop4: p1 15:51:04 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 943.243201][ T2135] print_req_error: 1534 callbacks suppressed [ 943.243213][ T2135] blk_update_request: I/O error, dev loop4, sector 1 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 943.261466][ T2515] blk_update_request: I/O error, dev loop4, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 943.272362][ T2515] buffer_io_error: 1531 callbacks suppressed [ 943.272369][ T2515] Buffer I/O error on dev loop4p1, logical block 0, async page read [ 943.286382][ T2515] blk_update_request: I/O error, dev loop4, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 943.297277][ T2515] Buffer I/O error on dev loop4p1, logical block 1, async page read [ 943.305319][ T2515] blk_update_request: I/O error, dev loop4, sector 3 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 943.316200][ T2515] Buffer I/O error on dev loop4p1, logical block 2, async page read [ 943.324240][ T2515] blk_update_request: I/O error, dev loop4, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 943.335139][ T2515] Buffer I/O error on dev loop4p1, logical block 3, async page read [ 943.343221][ T2515] blk_update_request: I/O error, dev loop4, sector 5 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 943.354142][ T2515] Buffer I/O error on dev loop4p1, logical block 4, async page read [ 943.362193][ T2515] blk_update_request: I/O error, dev loop4, sector 6 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 943.373094][ T2515] Buffer I/O error on dev loop4p1, logical block 5, async page read [ 943.381134][ T2515] blk_update_request: I/O error, dev loop4, sector 7 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 943.392037][ T2515] Buffer I/O error on dev loop4p1, logical block 6, async page read [ 943.392100][ T2515] blk_update_request: I/O error, dev loop4, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 943.392112][ T2515] Buffer I/O error on dev loop4p1, logical block 7, async page read [ 943.392798][ T2515] blk_update_request: I/O error, dev loop4, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 943.411048][ T2515] Buffer I/O error on dev loop4p1, logical block 0, async page read [ 943.411088][ T2515] Buffer I/O error on dev loop4p1, logical block 1, async page read [ 943.462659][ T2122] __loop_clr_fd: partition scan of loop4 failed (rc=-16) [ 943.468758][ T2126] loop1: p1 15:51:04 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000120000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:04 executing program 3: r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x80) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000140)={{0x6483}, {0x9, 0x1}, 0x8001, 0x4}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000580)={{&(0x7f0000ffc000/0x3000)=nil, 0x3000}, 0x3}) r2 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r3 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) request_key(&(0x7f0000000280)='encrypted\x00', &(0x7f00000002c0)={'syz', 0x2}, &(0x7f0000000300)='syz', 0x0) r4 = add_key$user(&(0x7f00000005c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000100)='\x00', 0x1, r3) keyctl$dh_compute(0x17, &(0x7f0000000340)={r4, r4, r2}, &(0x7f0000000440)=""/243, 0xf3, &(0x7f0000000540)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:04 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:51:04 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:51:04 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000000ffffffee000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:04 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000d00000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:04 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000fffff00000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r1, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) r2 = syz_open_dev$midi(&(0x7f0000000280)='/dev/midi#\x00', 0xd61d, 0x20000) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000200)={0x0, {0x2, 0x4e24, @multicast2}, {0x2, 0x4e21, @local}, {0x2, 0x4e21, @remote}, 0x208, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000140)='bridge0\x00', 0x1, 0x7fff, 0x493a}) mknodat(r2, &(0x7f0000000080)='./file0\x00', 0x8008, 0x9) 15:51:04 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x3fffe, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)=0x0) r2 = getpid() setpgid(r1, r2) ioctl$TUNSETLINK(r0, 0x400454cd, 0x2) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 943.771738][ T2160] loop2: p1 [ 943.774995][ T2160] loop2: partition table partially beyond EOD, truncated [ 943.782282][ T2160] loop2: p1 start 1 is beyond EOD, truncated 15:51:04 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000040)=0xab, &(0x7f0000000080)=0x2) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:51:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r1, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x2, 0x0) connect$rose(r2, &(0x7f0000000080)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, 0x1, @null}, 0x1c) [ 943.905473][ T2163] loop1: p1 15:51:04 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000080)) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl$sock_netrom_SIOCDELRT(r1, 0x890c, &(0x7f0000000140)={0x0, @default, @bpq0='bpq0\x00', 0x3, 'syz1\x00', @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x4, 0x3, [@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, @null, @default, @bcast, @bcast]}) 15:51:04 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000140000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 944.037344][ T2169] loop4: p1 15:51:05 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0xfffffffffffffffd, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) r1 = socket$kcm(0xa, 0x2, 0x88) sendmsg$kcm(r1, &(0x7f0000000580)={&(0x7f0000000080)=@in6={0xa, 0x4e24, 0x0, @mcast2}, 0x80, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="3800000000000000290000000400000079045015ff9982a53bf47a36c12579ee86bd7a000006000000e709d514c800"/56], 0x38}, 0xe803) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000002d00)="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", 0x585}], 0x1}, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0xb0001, 0x0) ioctl$VIDIOC_G_SELECTION(r2, 0xc040565e, &(0x7f00000000c0)={0xb, 0x0, 0x7, {0x5, 0x6, 0x1, 0x3d}}) 15:51:05 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000e00000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:05 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r1, r1}, &(0x7f0000000740)=""/243, 0xf3, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000340)}) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000340)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000500)) getpgid(0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000540)) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000600)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000640)=0x0) r4 = getpgrp(r3) get_robust_list(r4, &(0x7f0000000240)=&(0x7f0000000200)={&(0x7f0000000080)={&(0x7f0000000040)}, 0x0, &(0x7f0000000180)={&(0x7f0000000140)}}, &(0x7f0000000280)=0x18) r5 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x200202, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000300)={'veth0\x00', &(0x7f0000000440)=@ethtool_rx_ntuple={0x35, {0xa, @sctp_ip4_spec={@local, @remote, 0x4e20, 0x4e23, 0x97}, @ah_ip4_spec={@empty, @local, 0x101, 0xf2}, 0x7, 0x2, 0x1f, 0x9, 0xffffffffffffffff}}}) 15:51:05 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000000fffffff6000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:05 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700ffefffff00000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:05 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x200, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) r1 = open(&(0x7f0000000100)='./file0\x00', 0x80200, 0x0) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000340)={0x2b, 0x31, 0x15, 0x14, 0x5, 0xeae, 0x5, 0x77, 0xffffffffffffffff}) write$UHID_GET_REPORT_REPLY(r1, &(0x7f00000002c0)={0xa, 0x6, 0x12, 0x1}, 0xa) getsockname$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000180)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000280)={@dev={0xfe, 0x80, [], 0xb}, 0x41, r3}) r4 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer2\x00', 0x80200, 0x0) syz_open_dev$dspn(&(0x7f0000000240)='/dev/dsp#\x00', 0x8, 0x101000) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f00000001c0)=0x0) syncfs(r4) mremap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000, 0x0, &(0x7f0000ffe000/0x1000)=nil) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x100000001, 0x1, 0x3, 0x8001, 0x0, 0x7ff, 0x8, 0x2, 0xffff, 0x1, 0x4, 0x80000000, 0xc2d3, 0x4, 0x6, 0x5, 0x9, 0x6, 0x4, 0x2, 0x6, 0x5, 0x5, 0x5, 0x2, 0x1, 0xffffffffffffff3d, 0x3, 0x21ec3357, 0x917, 0x1, 0x3, 0x8, 0x0, 0xffff, 0xffffffff, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x9}, 0x804, 0xfffffffffffffff7, 0x7, 0x7, 0xffffffffffffffff, 0x100000000, 0x1000}, r6, 0x10, 0xffffffffffffffff, 0x8) socket$inet_sctp(0x2, 0x0, 0x84) 15:51:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x1000000080002, 0xc) sendmsg(r3, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000010907051dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) ioctl$SG_GET_RESERVED_SIZE(r1, 0x2272, &(0x7f0000000480)) ioctl$UI_GET_SYSNAME(r1, 0x8040552c, &(0x7f0000000140)) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000180)={0xfffffffffffffff7, 0x8000, 0x30e50f60, 0x6, 0x0}, &(0x7f0000000300)=0x10) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000340)=@assoc_value={r4, 0xb}, &(0x7f0000000440)=0x8) ioctl$DRM_IOCTL_GET_UNIQUE(r1, 0xc0106401, &(0x7f0000000080)={0xdc, &(0x7f0000000200)=""/220}) r5 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r5, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) [ 944.317174][ T2193] loop2: p1 [ 944.320463][ T2193] loop2: partition table partially beyond EOD, truncated [ 944.327746][ T2193] loop2: p1 start 1 is beyond EOD, truncated 15:51:05 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000280)="800000003806000019000300e60100006c000000000500000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53efb2491ac1405f8ef84d089017d66444740a8956552dd3ce0727903cf3862c08cb", 0x5a, 0x400}], 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x2000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:51:05 executing program 0: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x40, 0x0) recvfrom$rose(r0, &(0x7f00000000c0)=""/98, 0x62, 0x0, &(0x7f0000000140)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, 0x5, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null]}, 0x40) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x1, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) munlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000001180)) setsockopt(r0, 0x6, 0x6, &(0x7f0000000180)="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", 0x1000) 15:51:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x1000000080002, 0xc) sendmsg(r3, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000010907051dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) ioctl$SG_GET_RESERVED_SIZE(r1, 0x2272, &(0x7f0000000480)) ioctl$UI_GET_SYSNAME(r1, 0x8040552c, &(0x7f0000000140)) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000180)={0xfffffffffffffff7, 0x8000, 0x30e50f60, 0x6, 0x0}, &(0x7f0000000300)=0x10) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000340)=@assoc_value={r4, 0xb}, &(0x7f0000000440)=0x8) ioctl$DRM_IOCTL_GET_UNIQUE(r1, 0xc0106401, &(0x7f0000000080)={0xdc, &(0x7f0000000200)=""/220}) r5 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r5, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:05 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0xfffffffffffffffe, 0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x200, 0x0) setsockopt$inet_dccp_buf(r1, 0x21, 0xf, &(0x7f0000000180)="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", 0x1000) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'bcsh0\x00', 0x5}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000001180)={{{@in=@multicast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@remote}}, &(0x7f0000001280)=0xe8) ioctl$TUNSETOWNER(r0, 0x400454cc, r2) r3 = shmat(0xffffffffffffffff, &(0x7f0000ffa000/0x4000)=nil, 0x2000) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x101000, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r4, 0x4040534e, &(0x7f00000000c0)={0x20, @tick=0x5, 0x10001, {0x5, 0x5}, 0x1000, 0x1}) shmdt(r3) [ 944.590562][ T2208] loop4: p1 [ 944.595915][ T2205] loop1: p1 15:51:05 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700fdfdffff00000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:05 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000001f0000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:05 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000001100000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:05 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000000000025f7000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x1000000080002, 0xc) sendmsg(r3, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000010907051dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) ioctl$SG_GET_RESERVED_SIZE(r1, 0x2272, &(0x7f0000000480)) ioctl$UI_GET_SYSNAME(r1, 0x8040552c, &(0x7f0000000140)) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000180)={0xfffffffffffffff7, 0x8000, 0x30e50f60, 0x6, 0x0}, &(0x7f0000000300)=0x10) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000340)=@assoc_value={r4, 0xb}, &(0x7f0000000440)=0x8) ioctl$DRM_IOCTL_GET_UNIQUE(r1, 0xc0106401, &(0x7f0000000080)={0xdc, &(0x7f0000000200)=""/220}) r5 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r5, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:05 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) rseq(&(0x7f0000001180)={0x0, 0x0, &(0x7f0000001140)={0x0, 0x6, 0xeca6, 0x5, 0x3}, 0x2}, 0x20, 0x1, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x9, 0x105600) umount2(&(0x7f0000001340)='./file0\x00', 0x2) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000001200)='SEG6\x00') sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f0000001300)={&(0x7f00000011c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000012c0)={&(0x7f0000001240)={0x44, r2, 0x500, 0x70bd25, 0x25dfdbff, {}, [@SEG6_ATTR_ALGID={0x8, 0x6, 0x2}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DST={0x14, 0x1, @mcast2}, @SEG6_ATTR_SECRET={0x4}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x3}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000010}, 0x44) recvfrom$unix(r1, &(0x7f0000000140)=""/4096, 0x1000, 0x40000000, &(0x7f0000000080)=@abs={0x1, 0x0, 0x4e24}, 0x6e) [ 944.972160][ T2244] loop2: p1 [ 944.975468][ T2244] loop2: partition table partially beyond EOD, truncated [ 944.982860][ T2244] loop2: p1 start 1 is beyond EOD, truncated 15:51:05 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x10000, 0x0) r2 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) write$binfmt_elf64(r2, &(0x7f0000000180)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0x0, 0x7fff, 0xfff, 0xf845, 0x2, 0x7, 0x100000001, 0x31b, 0x40, 0x24d, 0x7, 0x8c, 0x38, 0x1, 0xff, 0x7ff, 0x2}, [{0x3, 0x7, 0x8, 0x9, 0x80000000, 0x4, 0xa7, 0x2}, {0x0, 0x4, 0x1, 0x1, 0x3, 0x2, 0xb, 0x3}], "b691911d2808e76c3dfdc28cf8eec865a9e43f4ceedcc9475ca13bc3378722862b612cc10cec14bb10d7f5124b285c97f8e8ec8fbe774060bbcd41e2329f59772bcb8b8b134e512a6cafbb26e82e834562ac4ae9fda1e84c41aae9349ea7a17ec8eaa93307cffd9632709fe0f0ecab4511e54b5fca0d4aeb8ffcd5112c08", [[], [], [], [], []]}, 0x62e) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_SWITCH_CTX(r1, 0x40086424, &(0x7f00000000c0)={r3, 0x2}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:51:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x1000000080002, 0xc) sendmsg(r3, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000010907051dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) ioctl$SG_GET_RESERVED_SIZE(r1, 0x2272, &(0x7f0000000480)) ioctl$UI_GET_SYSNAME(r1, 0x8040552c, &(0x7f0000000140)) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000180)={0xfffffffffffffff7, 0x8000, 0x30e50f60, 0x6, 0x0}, &(0x7f0000000300)=0x10) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000340)=@assoc_value={r4, 0xb}, &(0x7f0000000440)=0x8) ioctl$DRM_IOCTL_GET_UNIQUE(r1, 0xc0106401, &(0x7f0000000080)={0xdc, &(0x7f0000000200)=""/220}) keyctl$dh_compute(0x17, &(0x7f0000000580)={0x0, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) [ 945.149557][ T2252] loop4: p1 [ 945.182198][ T2258] loop1: p1 15:51:06 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000200000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:06 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07007fffffff00000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x1000000080002, 0xc) sendmsg(r3, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000010907051dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) ioctl$SG_GET_RESERVED_SIZE(r1, 0x2272, &(0x7f0000000480)) ioctl$UI_GET_SYSNAME(r1, 0x8040552c, &(0x7f0000000140)) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000180)={0xfffffffffffffff7, 0x8000, 0x30e50f60, 0x6, 0x0}, &(0x7f0000000300)=0x10) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000340)=@assoc_value={r4, 0xb}, &(0x7f0000000440)=0x8) ioctl$DRM_IOCTL_GET_UNIQUE(r1, 0xc0106401, &(0x7f0000000080)={0xdc, &(0x7f0000000200)=""/220}) keyctl$dh_compute(0x17, &(0x7f0000000580)={0x0, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:06 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000020ff8000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:06 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000001200000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x1000000080002, 0xc) sendmsg(r3, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000010907051dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) ioctl$SG_GET_RESERVED_SIZE(r1, 0x2272, &(0x7f0000000480)) ioctl$UI_GET_SYSNAME(r1, 0x8040552c, &(0x7f0000000140)) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000180)={0xfffffffffffffff7, 0x8000, 0x30e50f60, 0x6, 0x0}, &(0x7f0000000300)=0x10) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000340)=@assoc_value={r4, 0xb}, &(0x7f0000000440)=0x8) ioctl$DRM_IOCTL_GET_UNIQUE(r1, 0xc0106401, &(0x7f0000000080)={0xdc, &(0x7f0000000200)=""/220}) keyctl$dh_compute(0x17, &(0x7f0000000580)={0x0, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x1000000080002, 0xc) sendmsg(r3, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000010907051dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) ioctl$SG_GET_RESERVED_SIZE(r1, 0x2272, &(0x7f0000000480)) ioctl$UI_GET_SYSNAME(r1, 0x8040552c, &(0x7f0000000140)) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000180)={0xfffffffffffffff7, 0x8000, 0x30e50f60, 0x6, 0x0}, &(0x7f0000000300)=0x10) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000340)=@assoc_value={r4, 0xb}, &(0x7f0000000440)=0x8) r5 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r5, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) [ 945.543996][ T2288] loop4: p1 15:51:06 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'\x00', 0x2}) socket$rds(0x15, 0x5, 0x0) 15:51:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x1000000080002, 0xc) sendmsg(r3, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000010907051dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) ioctl$SG_GET_RESERVED_SIZE(r1, 0x2272, &(0x7f0000000480)) ioctl$UI_GET_SYSNAME(r1, 0x8040552c, &(0x7f0000000140)) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000180)={0xfffffffffffffff7, 0x8000, 0x30e50f60, 0x6}, &(0x7f0000000300)=0x10) r4 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r4, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) [ 945.744197][ T2299] loop1: p1 [ 945.751562][ T2289] loop2: p1 [ 945.754805][ T2289] loop2: partition table partially beyond EOD, truncated [ 945.762089][ T2289] loop2: p1 start 1 is beyond EOD, truncated 15:51:06 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070080ffffff00000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:06 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000000fffffdfd000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:06 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x20000, 0x0) r1 = getpgid(0xffffffffffffffff) migrate_pages(r1, 0x7, &(0x7f0000000140)=0x9, &(0x7f0000000180)=0x9) ioctl$BINDER_GET_NODE_DEBUG_INFO(r0, 0xc018620b, &(0x7f00000000c0)={0x3}) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x2, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) setxattr$security_capability(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='security.capability\x00', &(0x7f0000000240)=@v2={0x2000000, [{0xfff, 0xffffffffffff4862}, {0x9, 0x5}]}, 0x14, 0x3) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:51:06 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000250000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:06 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000002000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x1000000080002, 0xc) sendmsg(r3, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000010907051dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) ioctl$SG_GET_RESERVED_SIZE(r1, 0x2272, &(0x7f0000000480)) ioctl$UI_GET_SYSNAME(r1, 0x8040552c, &(0x7f0000000140)) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000180)={0xfffffffffffffff7, 0x8000, 0x30e50f60, 0x6}, &(0x7f0000000300)=0x10) r4 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r4, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:06 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x80, 0x0) r1 = syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0x1, 0x2) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f00000001c0)={0x8, 0x5}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f00000000c0)=@assoc_value, &(0x7f0000000140)=0x8) [ 946.082263][ T2326] loop4: p1 15:51:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x1000000080002, 0xc) sendmsg(r3, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000010907051dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) ioctl$SG_GET_RESERVED_SIZE(r1, 0x2272, &(0x7f0000000480)) ioctl$UI_GET_SYSNAME(r1, 0x8040552c, &(0x7f0000000140)) r4 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r4, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:07 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) munmap(&(0x7f0000ff8000/0x8000)=nil, 0x8000) 15:51:07 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'bond_slave_1\x00'}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:51:07 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000000fffffffd000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:07 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x321000, 0x0) ioctl$DRM_IOCTL_ADD_BUFS(r0, 0xc0206416, &(0x7f0000000080)={0x100, 0x1000, 0xfffffffffffffffa, 0x7, 0x11, 0x3c}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 946.351129][ T2338] loop2: p1 [ 946.354401][ T2338] loop2: partition table partially beyond EOD, truncated [ 946.361623][ T2338] loop2: p1 start 1 is beyond EOD, truncated [ 946.368076][ T2329] loop1: p1 15:51:07 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07008cffffff00000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet(0x10, 0x1000000080002, 0xc) sendmsg(r3, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000010907051dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) ioctl$SG_GET_RESERVED_SIZE(r1, 0x2272, &(0x7f0000000480)) r4 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r4, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:07 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000040)) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:51:07 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000fd250000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:07 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000002500000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 946.539826][ T2356] loop4: p1 15:51:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet(0x10, 0x1000000080002, 0xc) sendmsg(r2, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="24000000010907051dfffd946fa2830020200a0009000100001d85680c1baba20400ff7e", 0x24}], 0x1}, 0x0) r3 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r3, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:07 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'/fb0\x00', 0x2}) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000180)=ANY=[@ANYRES32=0x0, @ANYBLOB="910000008c376f2099488f36e287b0bae789a2f88f3339a815651c4a9bd7b29760161b0bd7991dea817e52c6c8435c50406ddf45312a291d39771df3eade8a73dbef9d9774ae8b74974840a36cfb261cab1125464f84cda0ac48a5f735841290af3d7ffd2d8f398d08050000004e89b6a9abf86f563b3f8e7f8d204fdad3e3d9d9eb2f13ee10c2cf9a81240e05bab043c9881f4c31"], &(0x7f0000000000)=0x99) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000240)={0x2, 0x6, 0x4, 0x7fff, r2}, &(0x7f0000000280)=0x10) setsockopt$RDS_FREE_MR(r1, 0x114, 0x3, &(0x7f0000000080)={{0x13a7, 0x800}}, 0x10) r3 = syz_open_dev$midi(&(0x7f0000003500)='/dev/midi#\x00', 0x7ff, 0x1) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f00000000c0)={'ip6_vti0\x00', {0x2, 0x4e23, @broadcast}}) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r3, 0x84, 0x20, &(0x7f0000003540), &(0x7f0000003580)=0x4) 15:51:07 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000000fffffffe000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:07 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x3, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:51:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) socket$inet(0x10, 0x1000000080002, 0xc) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:07 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'/fb0\x00', 0x2}) fsopen(&(0x7f0000000040)='devpts\x00', 0x1) open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x1) [ 946.887644][ T2375] loop1: p1 [ 946.891992][ T2380] Dev loop2: unable to read RDB block 1 [ 946.897623][ T2380] loop2: unable to read partition table [ 946.903472][ T2380] loop2: partition table beyond EOD, truncated [ 946.909633][ T2380] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 15:51:07 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070097ffffff00000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:07 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:51:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) [ 947.104422][ T2394] loop4: p1 15:51:08 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000003f00000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:08 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000003f0000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:08 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000fff000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:08 executing program 0: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:51:08 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x9, 0x400000) getsockopt$netrom_NETROM_T2(r0, 0x103, 0x2, &(0x7f0000000080)=0xf4, &(0x7f00000000c0)=0x4) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:51:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)) r1 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r1, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) [ 947.322026][ T2417] loop1: p1 15:51:08 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x400002, 0x0) ioctl$SIOCX25GDTEFACILITIES(r1, 0x89ea, &(0x7f0000000080)) ioctl$FS_IOC_FIEMAP(r1, 0xc020660b, &(0x7f0000000100)={0x0, 0x40, 0x5, 0x7, 0x1, [{0x5, 0x5, 0x7, 0x0, 0x0, 0x1}]}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'/fb0\x00\xff\xff\xff\xff\xff\xff\xff\xec\x00', 0x6}) 15:51:08 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700a1ffffff00000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:08 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000004000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)) r1 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r1, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:08 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x400402, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f00000013c0)=@filter={'filter\x00', 0xe, 0x6, 0x126c, [0x0, 0x20000140, 0x20000584, 0x20001098], 0x0, &(0x7f0000000080), &(0x7f0000000140)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{0x5, 0x18, 0x6558, 'team0\x00', 'ip6_vti0\x00', '\x00', 'batadv0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, [0xff, 0x0, 0x0, 0xff, 0xff, 0xff], @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, [0x0, 0xff], 0x6e, 0x1ce, 0x246, [], [@common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x0, '/usr/sbin/ntpd\x00'}}}, @common=@AUDIT={'AUDIT\x00', 0x8, {{0x2}}}], @common=@nflog={'nflog\x00', 0x50, {{0x3, 0x2, 0x3, 0x0, 0x0, "285731e248ae612a547ed87fd54edabb4a3a2c8c4d55e3ed44918908d4f80adc91562802673aa0d041acceb23c13c041027aa85b68f5cc5ce4fdb118c11346f6"}}}}, {0x5, 0x2, 0x22f0, 'ip6gre0\x00', 'ip_vti0\x00', 'erspan0\x00', 'veth0\x00', @remote, [0x0, 0x8f3aefbde36ce419, 0xff], @local, [0x0, 0x0, 0x0, 0xff, 0xff], 0x11e, 0x156, 0x1ce, [@mark_m={'mark_m\x00', 0x18, {{0x2, 0x82, 0x3, 0x1}}}, @rateest={'rateest\x00', 0x48, {{'eql\x00', 'bcsh0\x00', 0x2, 0x3, 0x2, 0x1, 0x237, 0x7, 0x8000, 0x81}}}], [@common=@dnat={'dnat\x00', 0x10, {{@random="b51b13ac81eb", 0xfffffffffffffffd}}}], @common=@NFLOG={'NFLOG\x00', 0x50, {{0x480, 0x0, 0x2, 0x1, 0x0, "fd6ece80bbea110cd385f466737a11c8117474029477a686c3b6b56f7bfa163c498408270472c54ead507096f8da0bea581004351667b08ccd8ea3fa6d0f3924"}}}}]}, {0x0, '\x00', 0x2, 0xffffffffffffffff, 0x2, [{0x13, 0x0, 0x88a8, 'bond_slave_0\x00', 'bridge_slave_0\x00', 'netdevsim0\x00', 'batadv0\x00', @remote, [0x0, 0x0, 0xff, 0xff, 0xff, 0xff], @link_local, [0xff, 0x0, 0xff, 0xff, 0x0, 0xff], 0x966, 0x966, 0x9ae, [@among={'among\x00', 0x8d0, {{@zero, @offset, 0x2, {[0xf0, 0x2, 0x23, 0xbdc, 0x10001, 0x7fff, 0x3, 0x100, 0x57dd, 0x8, 0xfffffffffffffffc, 0x4, 0x2, 0x7fffffff, 0x2, 0xff, 0x800, 0x6, 0xdea, 0xff, 0x4, 0x1, 0x985, 0x180000000000000, 0x100000000, 0x45, 0xfffffffffffffff8, 0x1, 0x4, 0x0, 0x2f5825c2, 0x4, 0xfba, 0x5, 0x5, 0x0, 0x4e6d, 0x45, 0x5, 0x7f, 0x9f8, 0xffffffffffff0a28, 0x3ff, 0x17c000000000, 0x0, 0x1ed, 0x0, 0x81, 0x8, 0x6, 0x0, 0x7, 0x0, 0x3, 0x1, 0x7fff, 0x80000001, 0x100000001, 0x9, 0x100000000, 0x1, 0xfffffffffffffffb, 0x13, 0x1, 0x1, 0x4, 0x2, 0x20, 0xfffffffffffffffe, 0x7, 0x8, 0xcd, 0xc5, 0x1, 0x7fffffff, 0x1, 0x29d3, 0x4, 0x8, 0x3aae773, 0x4, 0x9, 0x80000001, 0x9, 0x1, 0x810000000000000, 0x1000, 0x5, 0x59f1, 0x3, 0x9d, 0x100000001, 0x10000, 0x2109231, 0x2, 0x5, 0xffff, 0xfe84, 0x0, 0xaa9, 0x7, 0x1, 0x200, 0x7, 0x8, 0x3b, 0x6, 0x7fffffff, 0x3f, 0x2, 0x3, 0x42cb812, 0x1000, 0x2, 0x7, 0x1, 0x3, 0x7, 0x6, 0x7ea, 0x1, 0x0, 0x7fffffff, 0x1, 0x0, 0xc93, 0x3ff, 0x4, 0x6, 0xf3c2, 0xff, 0x4, 0x2, 0x3, 0x8, 0x2b, 0x0, 0x8, 0x100000001, 0x0, 0x8, 0x8d93, 0x1, 0x7fffffff, 0x80000001, 0x0, 0xead, 0x3ff, 0x8, 0x80000000, 0xb9, 0x7, 0x8000, 0x2, 0x3, 0x53, 0x8000, 0x5, 0x0, 0x8636, 0x6, 0xdd, 0xfffffffffffffffe, 0x80, 0x10000, 0x5, 0x20, 0x7, 0x3d, 0x100000000, 0x4b, 0x9, 0x3, 0x150a, 0x0, 0x10000, 0x6, 0x1800000, 0xbf6, 0x96, 0x8001, 0x1, 0x3e0d, 0x194b9f8d, 0x6, 0xb6b, 0x5, 0x9, 0x3ff, 0x8, 0x7f, 0x3, 0x4, 0x3ff, 0x6, 0x89, 0x1, 0x9, 0x1f, 0x2, 0x994, 0xebb, 0x81, 0x100, 0x81, 0x100000000, 0x5, 0x9, 0x5, 0xbb0, 0x1ff, 0x7fffffff, 0x6, 0x31, 0x0, 0x1000, 0x1, 0x7, 0x7, 0x8, 0x1, 0x2, 0x5, 0x2, 0x10001, 0x1000, 0xfffffffffffffffe, 0x7fffffff, 0x2a, 0x10e, 0xffffffff, 0x7, 0xfbb4, 0x401, 0x800000000000000, 0x6cfd, 0x478f, 0x4, 0x300000000000000, 0x8e, 0x8, 0xfffffffffffffffc, 0x5b2, 0x1ff, 0x6, 0x8, 0x9a, 0x6, 0x8001, 0x4, 0x9, 0x8001, 0x81, 0x101, 0x7, 0xbe, 0x3], 0x6, [{[0x2, 0x9], @multicast2}, {[0x9, 0xc], @multicast2}, {[0x100000000], @dev={0xac, 0x14, 0x14, 0x26}}, {[0x8, 0x5], @initdev={0xac, 0x1e, 0x0, 0x0}}, {[0x7fffffff, 0x8000], @broadcast}, {[0x101, 0x9], @remote}]}, {[0x6, 0x1, 0x8, 0x40, 0x3f, 0x3, 0x6e7f2838, 0x8, 0xc8de, 0x4, 0xb01, 0x4, 0x4, 0x100, 0x1, 0x1, 0x8000, 0x100000001, 0x9, 0x1, 0x8, 0x401, 0x7ff, 0xa0, 0x2ec, 0x3f, 0x8, 0x4, 0x9, 0x7fff, 0x63c, 0x6, 0x3, 0x1000, 0x6, 0x1ff, 0x6, 0x1, 0x0, 0x401, 0x3, 0x0, 0x6, 0x1f, 0x861, 0x3ff, 0x8000, 0x1, 0x8, 0x3f, 0x3ff, 0x9, 0x8, 0x0, 0x3, 0x7, 0x6, 0x37, 0x100, 0xffffffff, 0xd8, 0x2, 0x4, 0xffffffffffffff00, 0x7, 0x80, 0xfffffffffffffff8, 0x1, 0x8, 0xfffffffffffffffb, 0x1, 0x4, 0x0, 0x100000001, 0x0, 0x6, 0x8000, 0xfffffffffffffff7, 0x4, 0x5743, 0x200, 0x100, 0x33ae, 0x20, 0xda62, 0xc9db, 0x3, 0x5db5, 0xffffffff, 0xffff, 0x8537, 0xffffffff, 0x6, 0xffffffff, 0x7fffffff, 0x1d34, 0x81, 0x100000001, 0xe00, 0x2, 0x100000001, 0x8, 0x1, 0x5, 0x9, 0x1ff, 0x100, 0x81, 0x9, 0x4, 0x3, 0x200, 0x0, 0x5, 0x1, 0x8, 0x6, 0x2c, 0xfffffffffffffffe, 0x8, 0x3f, 0x400, 0x67a9, 0x1, 0xfdff, 0x4, 0x3ff, 0x5, 0x4, 0x4cf, 0x5, 0x5, 0xffffffff, 0x2, 0x401, 0x0, 0x0, 0x4, 0x6, 0x4, 0x7fff, 0x200, 0x401, 0x8, 0xb4, 0x4, 0x6, 0xd82, 0x5, 0x1, 0x2, 0x2, 0x1, 0x1, 0x1, 0xffffffffffffd82b, 0x8001, 0x200, 0x11, 0xc365, 0x8001, 0x3, 0xffffffffffffff01, 0x6, 0x4, 0x7fff, 0x5, 0xfff, 0x0, 0x80000000, 0x6, 0x1, 0x6, 0x6c56, 0x2, 0x0, 0x1, 0x5801, 0x2, 0x6b, 0x7, 0x2, 0x87, 0xfffffffffffffffe, 0x2, 0x8993, 0x1, 0x2, 0x7, 0xfffffffffffffffb, 0x1, 0xffffffff80000001, 0x2, 0x9, 0x9, 0x1, 0x9, 0x100, 0xffffffff, 0x2, 0x4, 0x7ff, 0x5, 0x4, 0x8, 0x8, 0xfffffffffffffff9, 0x8, 0x3, 0xffffffffffffffc1, 0x10000, 0x3f, 0x7fff, 0x6, 0x800, 0x7fff, 0xffe0000000000000, 0xb7f8, 0x3ff, 0xffffffffffff43b1, 0x5, 0xffff, 0x4, 0x200, 0x4, 0xc5be, 0x9, 0xfb, 0x7, 0x80000001, 0x2, 0x4a44, 0x400000000000000, 0x1f, 0x101, 0xec, 0x7fff, 0x1ff, 0x1ca, 0xfffffffffffffffb, 0xa, 0xfffffffffffffbff, 0x7fffffff, 0x5, 0x6, 0x9e8, 0x3ff, 0x1ff, 0x7fffffff, 0x7f, 0x8, 0xffff, 0x8, 0x7bf3, 0x31a51e55, 0xa38b, 0xfc3], 0x9, [{[0x9, 0x5bf1], @multicast2}, {[0x100000001, 0x7], @rand_addr=0x5}, {[0x0, 0x2], @dev={0xac, 0x14, 0x14, 0x24}}, {[0x9, 0xe3], @dev={0xac, 0x14, 0x14, 0x1e}}, {[0x6, 0x3], @loopback}, {[0x4, 0x6], @initdev={0xac, 0x1e, 0x0, 0x0}}, {[0x6, 0x2], @remote}, {[0x729, 0x1], @loopback}, {[0x5, 0x1b], @multicast1}]}}}}], [], @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00', 0x40, 0x596, 0x3}}}}, {0x9d5b7c505ebea87c, 0x40, 0x86dd, 'syz_tun\x00', 'rose0\x00', 'nr0\x00', 'rose0\x00', @empty, [0xff, 0xff, 0xff, 0x0, 0x0, 0xff], @empty, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], 0xee, 0xee, 0x136, [@nfacct={'nfacct\x00', 0x28, {{'syz0\x00', 0x7}}}, @m802_3={'802_3\x00', 0x8, {{0xf0, 0x6ffc, 0x2, 0x5}}}], [], @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00', 0xb8, 0x5, 0x5}}}}]}, {0x0, '\x00', 0x4, 0xffffffffffffffff, 0x2, [{0x15, 0x4c, 0xe867, 'bcsh0\x00', 'bpq0\x00', 'sit0\x00', 'bond_slave_1\x00', @broadcast, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x21}, [0x0, 0xff, 0xff, 0xff, 0xff], 0xe6, 0x146, 0x18e, [@ip={'ip\x00', 0x20, {{@multicast1, @local, 0xffffffff, 0xff0000ff, 0x6, 0x16, 0x0, 0xf92175a15df572d9, 0x4e21, 0x4e21, 0x4e21, 0x4e20}}}, @state={'state\x00', 0x8}], [@common=@CLASSIFY={'CLASSIFY\x00', 0x8, {{0x4}}}, @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x1}}}], @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0xffff, 0x9, 0xaf}}}}, {0x7, 0x10, 0x19, 'nr0\x00', 'ip6gretap0\x00', 'ip6gretap0\x00', 'lo\x00', @local, [0xff, 0xff, 0x0, 0x0, 0xff, 0xff], @empty, [0xff, 0x0, 0x0, 0xff, 0xff, 0xff], 0xde, 0x126, 0x156, [@connbytes={'connbytes\x00', 0x18, {{0x100000000, 0x10000, 0x1, 0x1}}}, @m802_3={'802_3\x00', 0x8, {{0xf6, 0x1, 0x2, 0x1}}}], [@common=@RATEEST={'RATEEST\x00', 0x20, {{'syz1\x00', 0x8, 0x8b7, 0x80}}}], @common=@CONNSECMARK={'CONNSECMARK\x00', 0x8, {{0x1}}}}]}]}, 0x12e4) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 947.469240][ T2421] loop2: p1 [ 947.472697][ T2421] loop2: partition table partially beyond EOD, truncated [ 947.479922][ T2421] loop2: p1 start 1 is beyond EOD, truncated [ 947.535169][ T2424] loop4: p1 15:51:08 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000400000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:08 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000020fff000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)) r1 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r1, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:08 executing program 0: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x4000, 0x0) getsockopt$XDP_MMAP_OFFSETS(r0, 0x11b, 0x1, &(0x7f0000000080), &(0x7f0000000140)=0x60) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x400004000000002}) [ 947.811758][ T2458] loop2: p1 [ 947.815069][ T2458] loop2: partition table partially beyond EOD, truncated [ 947.822404][ T2458] loop2: p1 start 1 is beyond EOD, truncated 15:51:08 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700c9ffffff00000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 947.876256][ T2452] loop1: p1 15:51:08 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x2980, 0x80) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000080)={0x0, 0x10000}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:51:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r1, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:08 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x220000, 0x80) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000140)=[@in={0x2, 0x4e21, @broadcast}, @in={0x2, 0x4e20, @empty}, @in6={0xa, 0x4e22, 0x3f, @remote, 0x5}, @in6={0xa, 0x4e24, 0x0, @remote, 0x9}, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e23, 0x7, @ipv4={[], [], @broadcast}, 0x8000}], 0x84) ioctl$UI_SET_SNDBIT(r1, 0x4004556a, 0x1) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:51:08 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000420000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 948.031196][ T2469] loop4: p1 15:51:09 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000005c00000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:09 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'/f\x00', 0x8100}) 15:51:09 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000000ffffefff000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r1, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:09 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x4000, 0x0) ioctl$PPPIOCATTCHAN(r1, 0x40047438, &(0x7f0000000080)=0x2) [ 948.211983][ T2490] loop2: p1 [ 948.215288][ T2490] loop2: partition table partially beyond EOD, truncated [ 948.222581][ T2490] loop2: p1 start 1 is beyond EOD, truncated 15:51:09 executing program 0: openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x100, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:51:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) syz_open_dev$swradio(&(0x7f0000000040)='/dev/swradio#\x00', 0x1, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r1, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) [ 948.429079][ T2498] loop1: p1 15:51:09 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x200000, 0x0) readv(r0, &(0x7f0000001280)=[{&(0x7f0000000140)=""/244, 0xf4}, {&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000000080)=""/125, 0x7d}, {&(0x7f0000001240)=""/16, 0x10}], 0x4) getsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f00000012c0)=0x8, &(0x7f0000001300)=0x2) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:51:09 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700e4ffffff00000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:09 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000f430000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 948.492595][ T2505] loop4: p1 15:51:09 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/f\x86\x00\x00\x9a\x00\x00\x00\x00\x00\x1f\x00', 0x2}) socket$vsock_dgram(0x28, 0x2, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x800, 0x0) ioctl$EVIOCSREP(r1, 0x40084503, &(0x7f0000000080)=[0x80000000, 0x81]) 15:51:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:09 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000000010000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:09 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000000000fffff000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r1}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:09 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2) write$selinux_attr(r1, &(0x7f0000000140)='system_u:object_r:run_init_exec_t:s0\x00', 0x25) ioctl$SIOCAX25GETINFOOLD(r1, 0x89e9, &(0x7f0000000180)) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f00000000c0)={0x5, 0xffffffff, 0x5}) ioctl$VT_ACTIVATE(r1, 0x5606, 0x101) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'/fb0\x00', 0x6}) syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x0, 0x200400) 15:51:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r1}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:09 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0x30a) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) r1 = pkey_alloc(0x0, 0x1) pkey_free(r1) [ 948.851929][ T2537] Dev loop2: unable to read RDB block 1 [ 948.857658][ T2537] loop2: unable to read partition table 15:51:09 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700ebffffff00000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 948.951781][ T2545] loop4: p1 15:51:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r1}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) [ 948.989973][ T2549] loop1: p1 p2 15:51:09 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) poll(&(0x7f0000000040)=[{r0, 0x2}, {r0, 0x8000}, {r0, 0x1402}, {r0, 0x200}, {r0, 0x2000}, {r0, 0x1d9}, {r0, 0x162}], 0x7, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 949.063750][ T2537] loop2: partition table beyond EOD, truncated [ 949.070021][ T2537] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 15:51:10 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000480000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:10 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000000007fffffff000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:10 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000000020000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:10 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x80, 0x0) ioctl$VIDIOC_DV_TIMINGS_CAP(r1, 0xc0905664, &(0x7f0000000200)={0x0, 0x0, [], @raw_data=[0xffffffff7fffffff, 0x7f, 0x10000, 0xfffffffffffffffe, 0x1, 0x800, 0x7, 0xe2, 0x161, 0x2, 0x8, 0x100000000, 0xde7, 0x4, 0x3, 0x6, 0x7, 0x401, 0x4, 0x6, 0x4, 0x7f, 0x7, 0xffffffffffff0d51, 0x9, 0x7327f904, 0x57, 0x0, 0x7, 0x1, 0xfff, 0x8001]}) ioctl$DRM_IOCTL_SET_UNIQUE(r1, 0x40106410, &(0x7f0000000080)={0x87, &(0x7f0000000140)="1c87e49cbe4c0aec2c4d74ded53207a0e3c520afd0a91a0695a7221979c50c7d763b764c8f8392eb43e71940ea832ccb23c89a7d63c3865f9a4ab22af94b9a15f214b42d49b3709475890119a4efc28f4d72ed9fe032722d8891dd8d3f91c4c9740bfd883b4bd8a28a3d93b4d6d458127dc170fd81b50becef8b09e932ccfe4c223e399a0ea006"}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:51:10 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) [ 949.311444][ T2590] Unknown ioctl -1064282524 [ 949.316415][ T2590] Unknown ioctl 1074816016 15:51:10 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700eeffffff00000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:10 executing program 3: r0 = add_key$user(0x0, &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) [ 949.391898][ T2587] loop4: p1 15:51:10 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f0000000080), &(0x7f00000000c0)) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000140)={{{@in6=@mcast2, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@remote}}, &(0x7f0000000240)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000280)={'team0\x00', r2}) dup3(r1, r1, 0x80000) [ 949.452696][ T2588] loop1: p1 p2 15:51:10 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000000ffffffff000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:10 executing program 3: r0 = add_key$user(0x0, &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:10 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000000030000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:10 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) r1 = getpgid(0xffffffffffffffff) ptrace$setopts(0x4206, r1, 0xffffffff00000000, 0x8) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x1) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) setxattr$trusted_overlay_opaque(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='trusted.overlay.opaque\x00', &(0x7f0000000180)='y\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 949.579836][ T2594] loop2: p1 [ 949.583282][ T2594] loop2: partition table partially beyond EOD, truncated [ 949.590493][ T2594] loop2: p1 start 1 is beyond EOD, truncated 15:51:10 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000004c0000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:10 executing program 3: r0 = add_key$user(0x0, &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:10 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x83ffe, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:51:10 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700f6ffffff00000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 949.822117][ T2619] loop4: p1 15:51:10 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', 0x0, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:10 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) ioctl$DRM_IOCTL_GET_UNIQUE(r1, 0xc0106401, &(0x7f0000000080)={0xf3, &(0x7f0000000140)=""/243}) [ 949.921953][ T2630] loop1: p1 p2 15:51:10 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700ffffffffffffffff000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:10 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', 0x0, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:10 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x3, 0x40) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x2400, 0x200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) r2 = socket$alg(0x26, 0x5, 0x0) syz_mount_image$nfs4(&(0x7f00000000c0)='nfs4\x00', &(0x7f0000000140)='./file0\x00', 0x3, 0x1, &(0x7f0000000240)=[{&(0x7f0000000180)="9e5edc26762243a4e2e929b8ae2df3b332f56500e14191c923122d6a3c0f41372d2cb341a7d4eeb93c183dd4ceb963a3a807d6927bd4e9fde0a11938643154ba83254d6606860fea2b257827afd428473fbe58fd26c93fed308ca28fa5d56ed683f2822af0bdd2d65ec0811c152e16e0d12f44f3f56f79b3250e64c84c21ae1b1fe62191e864f7a94f9f843ce7e4f44bb7042e76c524a19b748125a497fea57780c3f58936a9a53e3d126d52d02912de1e63287ff1480d594bab3a52", 0xbc, 0x40}], 0x2000, &(0x7f0000000280)='cpuset#^\x00') setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000040)="0ff487f9", 0x4) 15:51:10 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000000040000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 950.121138][ T2639] loop2: p1 [ 950.124440][ T2639] loop2: partition table partially beyond EOD, truncated [ 950.131773][ T2639] loop2: p1 start 1 is beyond EOD, truncated 15:51:11 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', 0x0, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:11 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x10000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:51:11 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000005c0000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:11 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700fdffffff00000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:11 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000002000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:11 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'/fb0\x00', 0x2}) socketpair(0x2, 0x3, 0x3ff, &(0x7f00000000c0)) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = accept$inet(r0, &(0x7f0000003dc0)={0x2, 0x0, @empty}, &(0x7f0000003e00)=0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000080)=0xc) ioperm(0xfff, 0xfffffffffffffbff, 0x0) ioctl$TUNSETOWNER(r0, 0x400454cc, r2) 15:51:11 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) [ 950.427578][ T2670] loop1: p1 p2 15:51:11 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:11 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) openat$vimc2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video2\x00', 0x2, 0x0) [ 950.578129][ T2694] print_req_error: 767 callbacks suppressed [ 950.578141][ T2694] blk_update_request: I/O error, dev loop1, sector 1 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 950.579596][ T2670] __loop_clr_fd: partition scan of loop1 failed (rc=-16) [ 950.587813][ T2516] blk_update_request: I/O error, dev loop1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 950.613456][ T2516] buffer_io_error: 766 callbacks suppressed [ 950.613464][ T2516] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 950.627367][ T2516] blk_update_request: I/O error, dev loop1, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 950.638245][ T2516] Buffer I/O error on dev loop1p1, logical block 1, async page read [ 950.646445][ T2516] blk_update_request: I/O error, dev loop1, sector 3 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 950.657322][ T2516] Buffer I/O error on dev loop1p1, logical block 2, async page read [ 950.665350][ T2516] blk_update_request: I/O error, dev loop1, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 950.676250][ T2516] Buffer I/O error on dev loop1p1, logical block 3, async page read [ 950.684282][ T2516] blk_update_request: I/O error, dev loop1, sector 5 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 950.695177][ T2516] Buffer I/O error on dev loop1p1, logical block 4, async page read [ 950.703227][ T2516] blk_update_request: I/O error, dev loop1, sector 6 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 950.714108][ T2516] Buffer I/O error on dev loop1p1, logical block 5, async page read [ 950.714143][ T2516] blk_update_request: I/O error, dev loop1, sector 7 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 950.714154][ T2516] Buffer I/O error on dev loop1p1, logical block 6, async page read [ 950.714184][ T2516] blk_update_request: I/O error, dev loop1, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 950.714194][ T2516] Buffer I/O error on dev loop1p1, logical block 7, async page read [ 950.715732][ T2516] blk_update_request: I/O error, dev loop1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 950.733121][ T2516] Buffer I/O error on dev loop1p1, logical block 0, async page read 15:51:11 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, 0x0, 0x0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:11 executing program 0: openat$pidfd(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self\x00', 0x100, 0x0) r0 = syz_open_dev$usbmon(&(0x7f00000000c0)='/dev/usbmon#\x00', 0x5, 0x10040) epoll_pwait(r0, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {}], 0x6, 0x2487, &(0x7f00000001c0)={0x401}, 0x8) bind$rxrpc(r0, &(0x7f0000000000)=@in4={0x21, 0x3, 0x2, 0x10, {0x2, 0x4e22, @local}}, 0x24) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000200), &(0x7f0000000240)=0x4) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000300)={0x0, 0x0, 0x8, 0x0, [], [{0x100000000, 0x8, 0x3, 0x101, 0x6, 0x40}, {0x1000, 0x7, 0x401, 0x3, 0x8, 0x6}], [[], [], [], [], [], [], [], []]}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000002c0)={'j\x00'}) fcntl$getownex(r1, 0x10, &(0x7f0000000040)) [ 950.770916][ T2516] Buffer I/O error on dev loop1p1, logical block 1, async page read [ 950.812640][ T2685] loop2: p1 [ 950.815861][ T2685] loop2: partition table partially beyond EOD, truncated [ 950.823187][ T2685] loop2: p1 start 1 is beyond EOD, truncated 15:51:11 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000000050000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:11 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700feffffff00000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:11 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x8001, 0x2000) ioctl$SG_GET_TIMEOUT(r0, 0x2202, 0x0) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0x3) fsetxattr$trusted_overlay_origin(r0, &(0x7f0000000040)='trusted.overlay.origin\x00', &(0x7f0000000080)='y\x00', 0x2, 0x2) 15:51:12 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000600000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:12 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380), 0x0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:12 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000003000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:12 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) 15:51:12 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380), 0x0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:12 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000010000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 951.292580][ T2728] loop1: p1 p2 15:51:12 executing program 0: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x200000, 0x0) setsockopt$RXRPC_SECURITY_KEYRING(r0, 0x110, 0x2, &(0x7f0000000080)='/^\x00', 0x3) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:51:12 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380), 0x0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:12 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000004000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:12 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000000060000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:12 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r1) sysfs$2(0x2, 0x200, &(0x7f0000000040)) 15:51:12 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3ba", 0x60, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) [ 951.506209][ T2752] loop5: p1 [ 951.546530][ T2743] loop2: p1 [ 951.549795][ T2743] loop2: partition table partially beyond EOD, truncated [ 951.557242][ T2743] loop2: p1 start 1 is beyond EOD, truncated 15:51:12 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000680000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:12 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) epoll_create(0x1) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:51:12 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000080000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:12 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3ba", 0x60, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:12 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x400301, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'veth0_to_bridge\x00', 0xc00}) ioctl$void(r0, 0xc0045878) r1 = syz_open_dev$media(&(0x7f0000000200)='/dev/media#\x00', 0x9, 0x10000) ioctl$VIDIOC_G_STD(0xffffffffffffffff, 0x80085617, &(0x7f0000000240)=0x0) ioctl$VIDIOC_S_STD(r1, 0x40085618, &(0x7f0000000280)=r2) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000140)={0x0, 0x7f}, &(0x7f0000000180)=0x8) setsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f00000001c0)=@assoc_id=r3, 0x4) getsockopt$inet_sctp6_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f00000002c0), &(0x7f0000000300)=0x8) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'veth1_to_hsr\x00', 0x939202cf57f6c232}) 15:51:12 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3ba", 0x60, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) [ 951.812272][ T2771] loop1: p1 p2 15:51:12 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000005000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:12 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000000070000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:12 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71f", 0x90, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:12 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/mixer\x00', 0x101000, 0x0) r2 = getpid() ioprio_get$pid(0xd1dfd8a9bc3358b0, r2) setsockopt$TIPC_SRC_DROPPABLE(r1, 0x10f, 0x80, &(0x7f0000000080)=0x7, 0x4) ioctl$DRM_IOCTL_ADD_CTX(r1, 0xc0086420, &(0x7f00000000c0)={0x0}) accept4$x25(r1, &(0x7f0000000040), &(0x7f0000000400)=0x12, 0x800) sendmsg$tipc(r1, &(0x7f0000000340)={&(0x7f0000000180)=@name={0x1e, 0x2, 0x3, {{0x43, 0x3}, 0x4}}, 0x10, &(0x7f0000000200)=[{&(0x7f00000001c0)="b7e69201fa7c4aa65c2a727ea33980353ec157c90af4d6c99ff06ba1236948c2", 0x20}], 0x1, &(0x7f0000000240)="c80ac0a1cb776f41c0ab7d2d155d6d33a444034ae00898590fc064d578caa783807c68585dc7c1910d20edc9be18eda49f2fb4e35fde97f731abce35a1f1ed521f8f354e9e4ceb7e4324f174b746fc12b5703aa7037b822e350a12e9430fcf5412fbbb26c6c6cccec88ef52ec2a13a2ab7a754950afd9ca4ca5eb7c17ec04ec94fe6821a1a0b6a228bf9364f0c43a49d00561c41b162aedb63e0d7667bbade3465998ad72e2eba932a49e4d9d9d1f6e3bb3fc9ecfe05bb2e4d5903c946a0f9a95daf", 0xc2, 0x40000}, 0x4) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, &(0x7f0000000380)={'nr0\x00', 0x3f}) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f0000000140)={r3, 0x1}) 15:51:12 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x18000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 952.012053][ T2789] loop2: p1 [ 952.015299][ T2789] loop2: partition table partially beyond EOD, truncated [ 952.022586][ T2789] loop2: p1 start 1 is beyond EOD, truncated [ 952.032850][ T2784] loop5: p1 15:51:13 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71f", 0x90, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:13 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000006c0000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:13 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000100000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:13 executing program 0: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x7, 0x40000) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000300)=0x7) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f00000000c0)={0xffffffffffffff54, &(0x7f0000000140)="69e52b2bd463215033ad3625a4c176254ce28cb71c87fe73676483cf6167767b365fb4ac73c3b5fd72035bbb03ade16c523416da5f2cdf809e5c142ba55d7793db8f79061645c82f8b854637503909e5f534ada64bd77753ca9ab53b7b279dcb2078084ce9169ea77c1c4570c2917c0f5a9aaf5207d5baefee9a9d00705ab2843aed57e356a8b4c883a6099e0d78b5e3cb32845504c204e044743a743022a9700fbd76a05eb17d81658d5c1c2f82f81da268bef702ce9c06739380365b3817c79fb18488ad52689633fa898231198657d95d6d047f1154709f0185127486687fb002c8"}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 952.224333][ T2811] loop1: p1 p2 15:51:13 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000000080000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:13 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000006000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:13 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71f", 0x90, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:13 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = dup2(r0, r0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080), 0x0) fcntl$setsig(r0, 0xa, 0x2d) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000140)={0x0, 0xea, "ea6cbae82e7ef44c25725376d6558e876c6e45c61cc858939aa4965d13be4dc611e77db582acc5cc5ad1b8ad12d27eff62726954e2f93ec697c5b21fa54078cec00c7d5e6584c72edbafbca9613adb44572ea9d4fd4203311bceeaf25cfdf0ea0d3e9ac069ac2760a4b7a6b1934c0e67a0cdc370c74428fd007e2d71048d96aef1b7e357e49ec54dc5fd49e806045d5d77ed0ac531002881e929ed4ea51993b149a56ed5ac1590f308b7465159de04796949f66bdb67efcd53c33e73ee524be85030cd39ad745262655ec2e67563aba1920fff665b931b113612ad647410dc3a3db42eee8c0429e7b351"}, &(0x7f00000000c0)=0xf2) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000900)={0x0, 0xf4, &(0x7f0000000800)=[@in={0x2, 0x4e21, @rand_addr=0x400}, @in6={0xa, 0x4e20, 0x6, @loopback, 0x81}, @in6={0xa, 0x4e21, 0x5d1, @dev={0xfe, 0x80, [], 0xe}}, @in6={0xa, 0x4e22, 0x800, @local, 0x7}, @in6={0xa, 0x4e22, 0x4, @local, 0x7}, @in={0x2, 0x4e24, @loopback}, @in6={0xa, 0x4e22, 0xfffffffffffffe01, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xff}, @in={0x2, 0x4e23, @broadcast}, @in6={0xa, 0x4e20, 0x3f, @dev={0xfe, 0x80, [], 0x2b}}, @in6={0xa, 0x4e21, 0x10001, @remote, 0x3}]}, &(0x7f0000000940)=0x10) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000980)={0x0, 0x200, 0x5, 0x3, 0xa4, 0x8}, &(0x7f00000009c0)=0x14) sendmmsg$inet_sctp(r1, &(0x7f0000000b00)=[{&(0x7f0000000040)=@in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0xc}}, 0x10, &(0x7f0000000080), 0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="18000000000000008400000007000000ac1414bb00000000180000000000000084000000070000000000032800000000180000000000000084000000060000006506000000000000300000000000000084000000010000000000000202000000000100003c02000007000000480b000000000000c08015569980659ad9520880f3bb92f0f513b1aa47dc388f1bb241e3f0f636ae1d1a41f8c633a2c5ce90480c6e5942a2cc9b22bbd1af107541", @ANYRES32=r2], 0x78, 0x40004}, {&(0x7f00000002c0)=@in={0x2, 0x4e21, @local}, 0x10, &(0x7f0000000780)=[{&(0x7f0000000300)="0d255ef0b50887d3835734cfd92f70a0e7debe44ea81a22d92c5878cb0b4bb66ed0da2da486db50b2e7f26d71ad5928e407303fbb9fdffd640c6ed5ab81d5676b53d040a1d75666462e62b27f2298f6d678899a3d54658abeb0a5759b442b0ff471c4472feb25ee39f08d7494053", 0x6e}, {&(0x7f0000000380)="c240ca08ba9f168882d835e950d16c811138ab3b754aa6708eebe8a5eb472c721d71b401cd4745e2a0b2a7fd062cf97e609e46685c6199b0c99ed22ec7e51ae0d8695f2e47a9795f91a3bf5e5e16cddae9f8f1eddc7535d273403beb798c6258c44fb60823b302fa440ec3680d54d6693eace4aa0ac604e7c21ba0390df50bb351900933363b0e59fe7d5106997aaa2753b457cad7fc11979ad379ae354e99a2cf2c105f03ad133b7445da809859a4918c543d22d4ba5a21e85bcc71df25e3019572c6bb42dba178f01e568a4aa47fab050985de9518", 0xd6}, {&(0x7f0000000480)="3ae25628b814702322ab297b7d87387d14e7d4dd14fb2750b71798216ccbfe61e0ade73baf1f440e390dcb924c027afd1c96970664801d8b44ed8fd51470ce3694abb3e8b344d6d5f432e9020d105990342b6074ac53a9d082f67b2fa9f6028c01ec82425e5aa3525ee04999772f83a3269bc319d524b4a04215868eec61201124f0cdc6fee3914ab03d19ebddf4634378ced19a6a4445afa9ee7b56e9b14be34b1221c58442e02f70ac0c2cf3f0f236673434eb569a7a89fda69a263ff355ab585b557f02c3a0932f1b46972ac0500a8925c496867e66db7ca062c2680bd622eaa885212a68a4", 0xe7}, {&(0x7f0000000580)="59330bcc08855d6ba9ac1cda12f02276efa2f52df6cbdde85ca09cc4a07601c4ac82e7587b3d1b66f4d997c63acf14d7b3b14e00de6c4dee16457efcdae695a1993a4ffe9086ed9161a2a19d2ce7e9827b809d7b82a0d4366c2a95a5f32086fdea8eac5437bc904dc8095f6881dadf11a74f666ff684b72755f0e114dc4274573cd3db94015ae5b52f3341a577e7c55c92a87d17385bed66ee5bb8abe7f56b4acf25a574e3f9470d419f327ff5c9f5ebb263924d824e2b1dba19c6dc61b763aabbc39ccc52fd8a48194dbe02a37e75d8096dc5a4ba900896fb1a063672e3e82bee43a09f84f96ab7", 0xe8}, {&(0x7f0000000680)="ddac98841df8bccdfc349046749e51f8de43b69284c416c46250e5e652b6daf894a750db93f22038f38f232697799eb7cf2ba2f956ad2bb14f2c731ce381d64bc41854cdcb9ba8947ef24fb6c9", 0x4d}, {&(0x7f0000000700)="399566e074db60c58a752346cd8670e90f892f24b775539570e7ec525e708786a3329eada4c55622166ba0f75e8110aa40aafca565920325443c729ee775811ed08ca385098c24d79fed0b6b8c0469eb0965935a0c79a99ed9f5e107ccf1de5286b4b0f490eedfaaf81454f1846c53dcd5362b", 0x73}], 0x6, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000008400000000000000ff030100000189c53000000000000000840000000100000002000200010000000400000009000000000000000700000001000000", @ANYRES32=r3, @ANYBLOB="20000000000000008400000008000000fe80000000000000000000000000000d18000000000000008400000007000000ffffffff00000000300000000000000084000000010000000800ff000800000004000000000000000900000000000000f8ffffff", @ANYRES32=r4, @ANYBLOB="18000000000000008400000007000000e00800020000000020000000000000008400000008000000e6f6f6f19760d177791a0dd0e41104002a00000000000000840490a796cc59fba6bc00e700000000d1000500000010ea7f000300"], 0x100, 0x4}], 0x2, 0x4) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:51:13 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c", 0xa8, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:13 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x2b, 0x80000) socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='mex\x9ct(W)\x02\xf8\xfcPI\x97\x1e9Zs\x00'/28, 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f00000000c0)={0x2f8}) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f0000000000)=0x200, 0x4) bind$inet(r3, &(0x7f00000003c0)={0x2, 0x200000000004e23}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r3, 0x6, 0xe, &(0x7f0000000480)={@in={{0x2, 0x0, @multicast1}}, 0x0, 0x40, 0x0, "41a0a84bd459485bb116e00349e915b1bc54791da97f7049816b1e6516915fd10c58883d497ba9829ceeabe4544c06d1f287834f279d7a9030cad94ec3e61787a7227dd3f2baa5acff93dc92fdb85fd7"}, 0xd8) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0xd, &(0x7f00000002c0)='veno\x00', 0x5) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) ioctl(0xffffffffffffffff, 0x0, 0x0) ioctl$SG_GET_SCSI_ID(0xffffffffffffffff, 0x2276, 0x0) getgid() ioctl$VHOST_RESET_OWNER(0xffffffffffffffff, 0xaf02, 0x0) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f00000008c0)={0x2, 0x4e23, @local}, 0x44) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000100), 0x4) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$sock_inet_SIOCRTMSG(0xffffffffffffffff, 0x890d, 0x0) recvmsg(r3, &(0x7f0000000240)={&(0x7f0000000040)=@nfc, 0xf012, &(0x7f0000000180)=[{&(0x7f0000003ac0)=""/4096, 0xdc00}], 0x1, &(0x7f0000000200)=""/20, 0x14}, 0x100) write$binfmt_elf64(r3, &(0x7f0000000280)=ANY=[@ANYRES32=r3], 0x100000530) setsockopt$CAIFSO_LINK_SELECT(r1, 0x116, 0x7f, &(0x7f00000000c0)=0x5, 0x4) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'/fb0\x00', 0x2}) r4 = dup(r0) accept4$vsock_stream(r4, &(0x7f0000000140)={0x28, 0x0, 0xffffffff}, 0x10, 0x3317a24464b43cc4) write$P9_RWSTAT(r4, &(0x7f0000000040)={0x7, 0x7f, 0x2}, 0x7) [ 952.542404][ T2832] loop5: p1 [ 952.597387][ T2835] loop2: p1 [ 952.600721][ T2835] loop2: partition table partially beyond EOD, truncated [ 952.608248][ T2835] loop2: p1 start 1 is beyond EOD, truncated 15:51:13 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c", 0xa8, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:13 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000740000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 952.790799][ T2844] loop1: p1 p2 15:51:13 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000007000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:13 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000021000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:13 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c", 0xa8, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:13 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba", 0xb4, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:14 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000000090000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:14 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba", 0xb4, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) [ 953.122235][ T2876] loop2: p1 [ 953.125563][ T2876] loop2: partition table partially beyond EOD, truncated [ 953.132911][ T2876] loop2: p1 start 1 is beyond EOD, truncated 15:51:14 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba", 0xb4, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:14 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000007a0000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 953.291261][ T2877] loop5: p1 15:51:14 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000008000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:14 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000002000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:14 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308", 0xba, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:14 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) r1 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x5, 0x200000) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-monitor\x00', 0x23611482b1edaae9, 0x0) fsconfig$FSCONFIG_SET_PATH(r1, 0x3, &(0x7f0000000080)='/fb0\x00', &(0x7f00000000c0)='./file0\x00', r2) epoll_create(0x5) [ 953.462002][ T2893] loop1: p1 p2 [ 953.492289][ T2904] loop2: p1 [ 953.495554][ T2904] loop2: partition table partially beyond EOD, truncated [ 953.502786][ T2904] loop2: p1 start 1 is beyond EOD, truncated 15:51:14 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308", 0xba, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:14 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) flock(r0, 0x5) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.events\x00', 0x0, 0x0) ioctl$KVM_GET_MSRS(r1, 0xc008ae88, &(0x7f0000000080)={0x2, 0x0, [{}, {}]}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x26102, 0x0) ioctl$VT_ACTIVATE(r2, 0x5606, 0x9) 15:51:14 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000000000000000000000000000a0000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:14 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000900000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:14 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x81, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snapshot\x00', 0x10100, 0x0) getsockname$unix(r1, &(0x7f0000000080)=@abs, &(0x7f0000000140)=0x6e) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f00000001c0)={0x81, 0x4, 0x200, "efd0106a798e7212c06f03aebbda2a3f8195b5f468b566d333707a62c7ebe6f90336c7caf7037d209bc32a472c8b78e0f596c9c975cffce6f6b5158e8326bd47100f78111e3ba81c82ad20a660531ec87205f10225a5a1d8f62161d7446e6305973303147468797436a6ede37a0661b6e16f14ee17d303588d80889687e9f33c18"}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:51:14 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308", 0xba, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) [ 953.712500][ T2913] loop5: p1 15:51:14 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x10000, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000fff000/0x1000)=nil, 0x1000}, &(0x7f0000000180)=0x10) splice(r0, &(0x7f0000000040), r0, &(0x7f0000000080), 0x7d2, 0x1) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:51:14 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000009000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:14 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000002600000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:14 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4", 0xbd, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:14 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'.\x7f\x000\x00\x00\x00\x00\x01\x00\x00\x00\a\x00', 0x400000000ffa}) [ 953.918696][ T2932] loop2: p1 [ 953.922092][ T2932] loop2: partition table partially beyond EOD, truncated [ 953.929311][ T2932] loop2: p1 start 1 is beyond EOD, truncated 15:51:14 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4", 0xbd, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:14 executing program 0: r0 = io_uring_setup(0xfc3, &(0x7f0000000000)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x3, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 954.015855][ T2938] loop1: p1 p2 15:51:15 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000025fd0000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:15 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000000000000000000000000000b0000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:15 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4", 0xbd, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) [ 954.253383][ T2957] loop5: p1 15:51:15 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f47725", 0xbf, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:15 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'/fb0\x00\x00\x00\x00\x00\x00\x00\x00\x0f\x00', 0x800002}) 15:51:15 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000a000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:15 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000004200000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:15 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f47725", 0xbf, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:15 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x200, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x400100, 0x0) mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x3, &(0x7f0000000040)=0xf6, 0x800, 0x2) [ 954.421905][ T2971] Dev loop2: unable to read RDB block 1 [ 954.427578][ T2971] loop2: unable to read partition table [ 954.433385][ T2971] loop2: partition table beyond EOD, truncated [ 954.439545][ T2971] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 15:51:15 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x8000, 0x0) socketpair(0x3, 0xe, 0x3ff, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$x25(r0, &(0x7f00000000c0)=""/111, 0x6f, 0x2002, 0x0, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x7, 0x8000) ioctl$KVM_GET_XSAVE(r1, 0x9000aea4, &(0x7f0000000180)) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r1, 0x10e, 0x1, &(0x7f0000000000)=0x18, 0x4) ioctl$TIOCGPKT(r1, 0x80045438, &(0x7f0000000580)) connect$x25(r1, &(0x7f00000005c0)={0x9, @null=' \x00'}, 0x12) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000600)={@initdev}, &(0x7f0000000640)=0x14) r2 = socket(0x11, 0x80002, 0x0) setsockopt(r2, 0x107, 0x5, &(0x7f0000001000), 0xc5) exit(0xc5) [ 954.562356][ T2978] loop1: p1 p2 15:51:15 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f47725", 0xbf, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:15 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000fff0000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:15 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:15 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000000000000000000000000000c0000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 954.718641][ T2995] loop5: p1 15:51:15 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:15 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000b000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 954.941718][ T3011] Dev loop2: unable to read RDB block 1 [ 954.947440][ T3011] loop2: unable to read partition table [ 954.953210][ T3011] loop2: partition table beyond EOD, truncated [ 954.959367][ T3011] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 955.001952][ T3021] loop1: p1 p2 15:51:16 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000009000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:16 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:16 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000800000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:16 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000000000000000000000000000d0000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:16 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r1, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) [ 955.395727][ T3039] loop2: p1 [ 955.399029][ T3039] loop2: partition table partially beyond EOD, truncated [ 955.407669][ T3039] loop2: p1 start 1 is beyond EOD, truncated 15:51:16 executing program 0: ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) r0 = fsopen(&(0x7f0000000040)='romfs\x00', 0x1) fcntl$setpipe(r0, 0x407, 0x30c5) 15:51:16 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r1, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:16 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000c000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:16 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000002000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 955.591180][ T3047] loop1: p1 p2 [ 955.607311][ T3040] loop5: p1 15:51:16 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r1, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:16 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000001000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:16 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000000000000000000000000000e0000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:16 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r1, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:16 executing program 0: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0xff, 0x40) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000080)={0x0, 0xfb9f}, &(0x7f0000000140)=0x8) clock_gettime(0x0, &(0x7f00000002c0)={0x0, 0x0}) utimensat(r0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={{0x0, 0x2710}, {r2, r3/1000+10000}}, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000240)={0x4, 0x2, 0x2, 0x3, r1}, &(0x7f0000000200)=0x10) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) keyctl$session_to_parent(0x12) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000180)=0x0) syz_open_procfs$namespace(r5, &(0x7f00000001c0)='ns/ipc\x00') openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x801, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:51:16 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000d000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 955.913038][ T3071] loop2: p1 [ 955.916308][ T3071] loop2: partition table partially beyond EOD, truncated [ 955.923612][ T3071] loop2: p1 start 1 is beyond EOD, truncated 15:51:16 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r1, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:16 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000180)='/dev/net/tun\x00', 0x2, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0xc714b381ab57356e) ioctl$HDIO_GETGEO(r1, 0x301, &(0x7f0000000080)) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00'}) [ 956.032224][ T3080] loop5: p1 15:51:17 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000009000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:17 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r1 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r1, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:17 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000002000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 956.172361][ T3095] loop1: p1 p2 15:51:17 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'netdevsim0\x00', 0x1400}) 15:51:17 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) [ 956.353929][ T3121] print_req_error: 767 callbacks suppressed [ 956.353940][ T3121] blk_update_request: I/O error, dev loop1, sector 1 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 956.360788][ T3095] __loop_clr_fd: partition scan of loop1 failed (rc=-16) [ 956.372043][ T2516] blk_update_request: I/O error, dev loop1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 956.389308][ T2516] buffer_io_error: 766 callbacks suppressed [ 956.389315][ T2516] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 956.395332][ T2516] blk_update_request: I/O error, dev loop1, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 956.414197][ T2516] Buffer I/O error on dev loop1p1, logical block 1, async page read [ 956.422354][ T2516] blk_update_request: I/O error, dev loop1, sector 3 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 956.433259][ T2516] Buffer I/O error on dev loop1p1, logical block 2, async page read [ 956.433296][ T2516] blk_update_request: I/O error, dev loop1, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 956.433308][ T2516] Buffer I/O error on dev loop1p1, logical block 3, async page read [ 956.452186][ T2516] blk_update_request: I/O error, dev loop1, sector 5 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 956.470990][ T2516] Buffer I/O error on dev loop1p1, logical block 4, async page read [ 956.478995][ T2516] blk_update_request: I/O error, dev loop1, sector 6 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 956.489879][ T2516] Buffer I/O error on dev loop1p1, logical block 5, async page read 15:51:17 executing program 0: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x2, 0x0) ioctl$BLKRAGET(r0, 0x1263, &(0x7f00000001c0)) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'bond0\x00', 0x10}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 956.498065][ T2516] blk_update_request: I/O error, dev loop1, sector 7 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 956.508982][ T2516] Buffer I/O error on dev loop1p1, logical block 6, async page read [ 956.517021][ T2516] blk_update_request: I/O error, dev loop1, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 956.528003][ T2516] Buffer I/O error on dev loop1p1, logical block 7, async page read [ 956.538714][ T2516] blk_update_request: I/O error, dev loop1, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 956.549633][ T2516] Buffer I/O error on dev loop1p1, logical block 0, async page read [ 956.557725][ T2516] Buffer I/O error on dev loop1p1, logical block 1, async page read [ 956.592302][ T3117] loop2: p1 [ 956.595598][ T3117] loop2: partition table partially beyond EOD, truncated [ 956.603017][ T3117] loop2: p1 start 1 is beyond EOD, truncated 15:51:17 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000000100000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:17 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000e000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:17 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) [ 956.665781][ T3120] loop5: p1 15:51:17 executing program 0: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x10800, 0x0) ioctl$TUNDETACHFILTER(r0, 0x401054d6, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000140)=""/190) write$tun(r0, &(0x7f0000000200)={@val={0x0, 0x88fd}, @val={0x1, 0x3, 0x2, 0x1, 0x3, 0x5}, @mpls={[{0x401, 0x0, 0x1}], @generic="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"}}, 0x10c) 15:51:17 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000001000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:17 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000402000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:17 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:17 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x101141, 0x120) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000140)={0x0, 0x7b, "15cd3c93add0920c5f4e4fc8ebcb1c54ddf8b654e84a1dde5c725008e1b489fc67a30a9cad4b3d76b0797d77a906bd377bfb7b44c85c345c67f2c2ce1e77845f4422eebcd56eabe31c810bf1e4f2216b1db8fba91dbccd99aa6a251923ea231ffc753439e732969e04f46e28cb775aa0bffec3b0cbd27a08a4ec12"}, &(0x7f0000000080)=0x83) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000000c0)={r2, 0x7fff}, &(0x7f0000000200)=0x8) 15:51:18 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40145, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:51:18 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(0x0, &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) [ 957.136068][ T3169] loop2: p1 [ 957.139336][ T3169] loop2: partition table partially beyond EOD, truncated [ 957.146650][ T3169] loop2: p1 start 1 is beyond EOD, truncated [ 957.153419][ T3173] loop5: p1 15:51:18 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x200000, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'/fb0\x00', 0x2}) [ 957.219274][ T3170] loop1: p1 p2 15:51:18 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(0x0, &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:18 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000000110000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:18 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000003000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:18 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000010000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:18 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000002000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:18 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x400, 0x0) syz_open_dev$video4linux(&(0x7f0000000080)='/dev/v4l-subdev#\x00', 0x8000000000000002, 0x20000) 15:51:18 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(0x0, &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:18 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', 0x0, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:18 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) write$P9_RCREATE(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x73, 0x1, {{0xc0, 0x2, 0x1}, 0xffffffff}}, 0x18) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000040)) [ 957.605551][ T3214] loop5: p1 15:51:18 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000004000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:18 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', 0x0, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:18 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x18}, 0x10) ioctl$TUNSETFILTEREBPF(r0, 0x800454e1, &(0x7f0000000240)=r1) r2 = accept4$ax25(0xffffffffffffffff, &(0x7f0000000180)={{0x3, @netrom}, [@null, @remote, @netrom, @null, @default, @default, @bcast]}, &(0x7f0000000200)=0x48, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000003c0)={{{@in=@initdev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f00000004c0)=0xe8) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000500)={'vcan0\x00', r3}) r4 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x9, 0x20000) ioctl$BLKTRACESTOP(r4, 0x1275, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:51:18 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) ioctl$KVM_SET_DEVICE_ATTR(r0, 0x4018aee1, &(0x7f0000000080)={0x0, 0x64f9, 0x2200ae2b, &(0x7f0000000040)}) [ 957.822442][ T3215] loop2: p1 [ 957.825751][ T3215] loop2: partition table partially beyond EOD, truncated [ 957.833084][ T3215] loop2: p1 start 1 is beyond EOD, truncated [ 957.905198][ T3224] loop1: p1 p2 [ 958.032051][ T3262] loop5: p1 15:51:19 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000000120000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:19 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x1, 0x4002) sendmsg$kcm(r1, &(0x7f00000007c0)={&(0x7f0000000140)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x3, 0x4, 0x0, 0x1, {0xa, 0x821, 0xfffffffffffffff7, @local, 0x80000001}}}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000000300)="2bf7db5b7170251163901d525d089b5627baed4a4d2ce7a7259967e71fb11a0f45aeecdd8f09be9b01151c7b7af3c4dc4e4baac3d3716fe7ab5bce720586d90213b9f0aaba368dc99867643e9e2cd03ef168fad1817f9c9bd62507d37225d90d724e8dce1a7bde89410441d019ba28e9f722c3155b9d7b86b67d4afb10978c30c42af56f84327fa252f90826974b299c044975929ba25ea28aa911266afa3a8ba179fce65c0fa27bf8bc907d303b5bcd3c72cf967ce4e5dd367fc3e9a19ce03b2c30961c40bada05b3b6e7c296ee7d77dc", 0xd1}, {&(0x7f0000000400)="dd3d4f28b37d914a712084c91a1ea5088b18a7891068205081152f20b181dac1282a7291b82069e81093b805b8a30074af42e45f2d241b28b475882e0d1ee48114b67ff2aeafdf9258baa2b3777268237f82965332c5d7d3ccf29c05", 0x5c}, {&(0x7f0000000480)="ab5d45f8124d5360843df4407360501e7f3fb21bfe612c641f7580e0954532562a20fe51c15a8cd64114aca522546e25c1db05a5879093e8fc1cb56addf841a9fdbee6e26b0b5989a9a7fc18015b1da0ae8ed202a86870ba5a41dee3b2744dbf3fc108a986ab69ae4658703ffd4b2d4f70feea5b8a0a", 0x76}, {&(0x7f00000001c0)="fbbf7bc6e939255800c5ac5ae63b", 0xffffffffffffff3c}, {&(0x7f0000000500)="e5dd44a5ea3ecb297b7d1c574685c874e989f2cddcd757e15007b98bb1424f872091c092c1dceadd6d79bbab0517c48e3d0336fdc1467399db200573d21834c1e53bd4e814c6aec8043fdc0be2d0ac4124f8a81412cf1bf6b0181c253879808c67ac4e4cfc50fab8aab089ccd9d48e9aeaa02a2862404fd8867abc49d025620606e61f303c07474a6e78b2221a469f4ffbf74650982dc8493ad8e8e795b31b4fcc520c8d208dc89a450fb45177de3449af", 0xb1}], 0x5, &(0x7f0000001fc0)=ANY=[@ANYBLOB="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"]}, 0x24040000) r2 = dup3(r0, r0, 0x80000) setsockopt$inet6_tcp_buf(r2, 0x6, 0x1f, &(0x7f0000000940)="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", 0xc) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) ioctl$SIOCAX25CTLCON(r2, 0x89e8, &(0x7f0000000640)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x63, 0x7, 0x8, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x800, 0x0) r4 = openat(r3, &(0x7f00000002c0)='./file0\x00', 0x40100, 0x60) ioctl$GIO_SCRNMAP(r2, 0x4b40, &(0x7f0000000800)=""/197) ioctl$VIDIOC_SUBSCRIBE_EVENT(r4, 0x4020565a, &(0x7f0000000040)={0x2, 0x400000000e6, 0x1}) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(r4, 0xc0945662, &(0x7f0000000200)={0x3, 0x0, [], {0x0, @reserved}}) 15:51:19 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000011000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:19 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', 0x0, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:19 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000003000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:19 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000005000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:19 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:19 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'ip6tnl0\x00', 0x40000000400}) 15:51:19 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:19 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x22000, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x38, r2, 0x210, 0x70bd2a, 0x25dfdbfd, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0x7a30}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x55d}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x4}, @SEG6_ATTR_SECRET={0x4}]}, 0x38}, 0x1, 0x0, 0x0, 0x4008000}, 0x40000) 15:51:19 executing program 0: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x80, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'nlmon0\x00', 0x2}, 0x18) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000080)=r0) 15:51:19 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000012000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 958.436623][ T3281] loop2: p1 [ 958.439935][ T3281] loop2: partition table partially beyond EOD, truncated [ 958.447231][ T3281] loop2: p1 start 1 is beyond EOD, truncated [ 958.517040][ T3291] loop1: p1 p2 [ 958.524685][ T3292] loop5: p1 15:51:19 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:19 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x800000000, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f0000000040)='security.SMACK64\x00', &(0x7f0000000080)='\x00', 0x1, 0x3) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snapshot\x00', 0x40000, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r1, 0x40042409, 0x1) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f00000002c0)={0x0, 0x100}, &(0x7f00000003c0)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000400)={r2, 0xfff}, 0x8) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000300)={0x10001}, 0x1) socket$inet_sctp(0x2, 0x5, 0x84) r3 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ubi_ctrl\x00', 0x1, 0x0) ioctl$TCSETSW(r3, 0x5403, &(0x7f0000000140)={0x0, 0x9, 0x6, 0x7, 0xf, 0x7, 0x81, 0x400, 0x80000001, 0x100, 0x4, 0x1f}) write$apparmor_current(r3, &(0x7f0000000340)=ANY=[@ANYBLOB="737461636b200c6465762f7562695f6374726c01e5bd89541163217e02e0e64e282f63311949a2946ecc84251f8f984cc459c1efe89c8f46a3107d622be43f10f742d3647b3f11e93c0ea229285c4c21e301d77b3f73c8c9eb1cd861bdedd84be7c4e0e66922cdc1d9f09a9623d3"], 0x14) setsockopt(r3, 0x3, 0x6, &(0x7f0000000200)="4fca2bab82cbdc0060a1db5c2301984bc667220e63d78cd73dc9d74424af36cd48b8ee5a96e9f558de91a8812e4333b551302bc6f6e6db0c41f4e1149669d38d2a1a2c62389f9bd55e1290f0b1a299acd7646dc998b2c51e271d4b5da7a67bb497669f0cd0023cbbb6bca94481c86526d152178be2655d0f3112e586d772de5f321a52f37bbe92bd86227dc955a47d6e5d44f86a", 0x94) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000100)={'rose0\x00', 0x1101}) 15:51:19 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000000200000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:19 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000004000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:19 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000006000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:19 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:19 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fG0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 0x2}) 15:51:19 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000014000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:19 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) [ 958.892498][ T3331] loop2: p1 [ 958.895792][ T3331] loop2: partition table partially beyond EOD, truncated [ 958.903161][ T3331] loop2: p1 start 1 is beyond EOD, truncated 15:51:19 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x10082, 0x0) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f00000002c0)=@gcm_256={{0x307}, "992a7cf72a3636d0", "93d40da74a276df3dc467274b1c39284ef06dbada31456b53316500fa3302655", "be5cb7e9", "fe51eb4c542e76d7"}, 0x38) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0xbc, &(0x7f0000000140)=[@in6={0xa, 0x4e22, 0x7, @dev={0xfe, 0x80, [], 0x28}, 0x10001}, @in6={0xa, 0x4e23, 0x2, @remote, 0x6}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x4e23, @local}, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e22, 0x7, @mcast2}, @in6={0xa, 0x4e22, 0x101, @mcast1, 0xc93}, @in6={0xa, 0x4e21, 0xffff, @ipv4={[], [], @multicast1}, 0x4}]}, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000200)={r2, @in={{0x2, 0x4e23, @loopback}}, 0x7, 0x40}, 0x90) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:51:19 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100), 0x0, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) [ 959.002301][ T3342] loop1: p1 p2 15:51:20 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x1, 0x0) ioctl$VIDIOC_S_TUNER(r1, 0x4054561e, &(0x7f0000000180)={0x1f, "97d666c0998ba064913a88b8faca644a5edb68aa6b96cbd3dc3e1a460008aea0", 0x0, 0x28, 0x0, 0x0, 0x14, 0x7, 0xe48, 0x8}) ioctl$KVM_UNREGISTER_COALESCED_MMIO(r1, 0x4010ae68, &(0x7f0000000140)={0x16000}) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000080)={{0xa, 0x4e23, 0x0, @loopback, 0x80000001}, {0xa, 0x4e24, 0x8001, @remote, 0x9}, 0xa8c3, [0x2, 0x8001, 0x1, 0x401, 0x0, 0x40, 0xfffffffffffffff9, 0x634f]}, 0x5c) 15:51:20 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000005000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:20 executing program 3: add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000740)=""/243, 0xf3, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) [ 959.138729][ T3340] loop5: p1 15:51:20 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000000250000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:20 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=0x0) getpgid(r1) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x101100, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r2, 0xc008ae67, &(0x7f00000000c0)={0x8208, 0x91}) bind$nfc_llcp(r2, &(0x7f0000000140)={0x27, 0x1, 0x0, 0x5, 0x3f, 0xc11, "9df570a2af3d975ec466dff04df54d673ccfb8d1c88f568b893b98f3338b7ba1e1c089e2665e9fbbd5be365c3c95289929d0d0fa4f214119cfde9bc8fde14b", 0x2b}, 0x60) 15:51:20 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000406000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:20 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000025000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:20 executing program 3: add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000740)=""/243, 0xf3, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:20 executing program 0: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x10100, 0x0) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000002680), 0x80000) r2 = syz_open_dev$usb(&(0x7f0000003b40)='/dev/bus/usb/00#/00#\x00', 0x1000, 0x2000) sendmmsg(r0, &(0x7f0000003d40)=[{{0x0, 0x0, &(0x7f0000001500)=[{&(0x7f0000000140)="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", 0x1000}, {&(0x7f0000000080)="bc163a02719927cab2ccf27b8f464d9435efb89a184e236960dd73b66bc694afd950494666165b2704d53b0ee061e7229e5a4a2815813f9af892ed2ccf9dea5d04fb631d71413201a805de4f48a65be8841f", 0x52}, {&(0x7f0000001140)="ebbece065ef3c3aa5b02d4f2d61980a4d789196d6c595701024ea07c474d85e35eeede64d2c7860e8e36f4e4cf18fc733c1a74cbe3de3d44e93691c45fa4a2a32be90027940dc3d3c99a2fc725", 0x4d}, {&(0x7f00000011c0)="a2fcc74ef3b1399c30e5242b0a9947700af0216265e0707fef4f588573657b6f54869ea5f83faf129d7a6d37bbd3c0d8c8ff6cf3d01c8a0a6ee38675a639ba0878997c745678ab17af676903b03d3d0ac37df1b68e02a36e17f739d155d332a759f4b0178ca64c757918a52474edd30db5adbce22d1a31ff57b9f73907d989cb39d9bb32d965c16101b82c28ff9415e5061f594006e7ac33bf65c37b13752b78d2681e9541e78f3a5e315771aff45d515695b4152a5ec300134d4239e27ddcfe3d92b55ba8f266978af6cd54b61245bed298b6de9dfdb2ab", 0xd8}, {&(0x7f00000012c0)="9051e83dae7097b0681c54b1975a059fcb5f43378ae4e84023ea865f06a68d06b7910aac562907951089f94e0eb6a95ed54c4c32f758eaaced32f7a17fd00a142874186652302fc20f22ee4df1f3a9da0424afb3099e8b9214f0756c5ea4e5a83c9e540af55cb9cfe60a8fb1f0056e5441033be9b73dcb432a159f9db3081317d01926b00f4703e4969c9fa4", 0x8c}, {&(0x7f0000001380)="95a840d5d72fdbb16622d027b56dc2aeadb242d416174af7b869877ed09f6c88808b80a7501f5badfbc82cbb7b6a4b55f5cd4e30fc28758fd0c762f124dd343251b8a68e586eb3", 0x47}, {&(0x7f0000001400)="22e1cf18aab1ed6dacb266f67820478007a5ee0a4ea88331f27c952a21a7f393cf5e5d2c2b39cf1d9dfd795b19f99c8c19abdd14937058e7db79fdbfed0a90425649244e81b7099b2f7db478bce691460139ce06618f1126dc28589715f80df4044da4a9118b9b34efcdf10981725819468af9a4ce70865b75fafbc5400f9394d7a9fddb28e88eaa1c2022ef23125676f22eb9559535aa08e140f836df5de063f4ce627b8a35357a2cac148bb4041937dc4e3cce992c3f22696096bbff686549760c1f930ddc", 0xc6}], 0x7}}, {{&(0x7f0000001580)=@isdn={0x22, 0xfffffffeffffffff, 0x7, 0x5c, 0x2}, 0x80, &(0x7f0000002640)=[{&(0x7f0000001600)="82f3fe26c43bb0c8b9d7225141d7d22ad2b459a50a8c3bbfa567465eca05603cd56e03a78cd835b1626434b56d6e56483150d5625a7fbf1ba43503759a39", 0x3e}, {&(0x7f0000001640)="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", 0x1000}], 0x2}}, {{&(0x7f00000026c0)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e23, @empty}, 0x2, 0x1, 0x1, 0x2}}, 0x80, &(0x7f0000003a00)=[{&(0x7f0000002740)="ba0569d4ac96c923a8381b955b1b24f47b0fe8b35b35524aed2ef3b30a97141ef1e9019d7630cc9257a5ea0f99742a6b7f67627b5e4d0d1d24f9037f79db2cc0c7ab2d21539681a0c8a08d8ab8950020cc5ad3c4ee1eec52c3ffd18e53e4a07629a4f662407bea1c389478a43ceb82482fa69505cfa742ba7155dc95c6810ce510e285d3d600183b818848cb30bc4adadcb54245aedf5010efa3e9dd7f24080c5f877967696f33aee270378cf782f762f82860a1c834f6b90afa8776e434466e16bb75afa30e63ed032d0e61deae203c5da596d3fc4c4d3a943f0cced7905904f817", 0xe2}, {&(0x7f0000002840)="0a644d0e426a355d4e4b2e38ce60deebb1d5535e033c65a61f5caee1cc863127f98e3d16b96e336560fb0920607aa9d4958a4cd02d5098697707026235b9ded99dd9ce56834603b92cb4d8", 0x4b}, {&(0x7f00000028c0)="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", 0x1000}, {&(0x7f00000038c0)="f852ffd32b382b29fd5676", 0xb}, {&(0x7f0000003900)="c316df284c0b6be0b115b8d2fc0176328477a11ce31715814682d30acf82fe9130c093060880868812572433115e361934fb3e373a8e363c15bd5d93b28a49e26461af2b863e67690ed5c2201e7cbf641cb60049ac357b1bfbcf53b8584981f1294e84c8ee0996878477ac003314c30d5fccad0304fe336853916c5030ef0c25dd09392ec61b067c20b077fe5a6367f06e7d7adbe09bc7527daa08d526a10e6cad5ae21e0821de94e62b536df4b64e40e497aabe187b8b6651ee8ac2b2db56244e8c62db7de1319f19bc2d54cbe12634b281cb1d2f5851037355f3d8", 0xdc}], 0x5, &(0x7f0000003a80)=[{0x90, 0x10c, 0x7, "1d570f4349e58852f31d0afd7bf11090a794f6cb7213b1873f4f6e76f18ac24310488b962854b38c358f0d9b7b29e17ae93f986e6915461e25cbe52e7ab4c4d7e9338f63231a39aa79d05dec90abb15d922dccf2be5d60764fc61c272445cd3ccf4e78c2adbbb2a36313d3a808cbb3d683a9fa948ddc28997317e73905"}, {0x10, 0x0, 0x6}], 0xa0}}, {{&(0x7f0000003b80)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x4e22, @remote}, 0x4, 0x1, 0x3}}, 0x80, &(0x7f0000003d00)=[{&(0x7f0000003c00)="8d6632f3f7e0c262e93c4c15409471a63d0d9ecaa0aaab6327a48109443a758749917f670059e9b728fb8c13282eed09c1855b4b7a4d54df4b615e92a42c754c84462af27fd7f08368c8f426f784b86daf909cd8125690e879070d9eb649a3e5ac48341b9a074a995723220dbefe00e2686cdda4be93a20e469c4a0f4d186f53e11a5ea2a584de64bc7c04ef3e73772e68e3fa4044019fddf912f3c087df4d873f271e810d69878148181bfa4f7df866cca4ef63439875ba423b1fb373ab65ec3b7cf795030fac111434ca511beb3783a55526ff22d352e7991df70cb7a539201fea7b183e", 0xe5}], 0x1}}], 0x4, 0x40000) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:51:20 executing program 3: add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, 0x0, &(0x7f0000000740)=""/243, 0xf3, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) [ 959.445660][ T3381] loop2: p1 [ 959.448959][ T3381] loop2: partition table partially beyond EOD, truncated [ 959.456337][ T3381] loop2: p1 start 1 is beyond EOD, truncated [ 959.509873][ T3389] loop5: p1 15:51:20 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x2, 0x20200) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:51:20 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={0x0, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:20 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) r1 = socket(0x0, 0x80005, 0x4) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000040)={0x0, 0xb3, "8dae0a77102ba8803cac8d06f499c16e732636f3f157c1a81aa44f9d80c0e0bfb26abcd2592742f959f7a91f555a6ccc01eb844b6686d116058c6be3c01d855327523a28933820882a1c9b91706efa0f72be56d7fc33a0033f5d17bd0fbc38becbf34524d964cba361508cc447ba5020f55e0c73209a746ffbbc91ce3dab2de0c996f5bce8f78de5d11786e27d0a9a323294a9d7f0be0aa6bd938d41f163cd4317d0cd05c8deb74995ee95a485a9e60cdb2135"}, &(0x7f0000000140)=0xbb) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000000180)=@assoc_value={r2}, &(0x7f00000001c0)=0x8) [ 959.721895][ T3398] loop1: p1 p2 15:51:20 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000006000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:20 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000042000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:20 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) 15:51:20 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000007000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:20 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={0x0, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:20 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000000000000000000000000003f0000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:20 executing program 0: syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x3, 0x8002) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/f\xe00\x00', 0x2}) 15:51:20 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={0x0, r0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:20 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x10004, 0x0) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000140)={0x0, 0x80000}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r0, &(0x7f0000000300)={&(0x7f0000000200), 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r2, 0x300, 0x70bd2b, 0x25dfdbff, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x8080) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f0000000180)={0x0, 0x80000, 0xffffffffffffffff}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r0, 0xc00c642d, &(0x7f00000001c0)={r1, 0x80000, r3}) r4 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x800, 0xf6) ioctl$UFFDIO_REGISTER(r4, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ffb000/0x4000)=nil, 0x4000}, 0x1}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) [ 959.963036][ T3434] loop5: p1 15:51:20 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x1, 0x0) mq_timedsend(r0, &(0x7f0000000140)="088cd6bade14a113ee0461054276bee34c8b91ba86f1f5fb32edf28d213c4f0d4abd42d7ab4636374635810b9c778d0b93b542ff361be2a8baf9e593b822412398009ba1ed2f45ffed1cddc35c9967f9455637fd837a2dc94589d5683475728eb48cd4f083893ef67f9beeb695e3b9ce25842f8574a0dd811c207909f83418e35d6ef4f62c9a4b3906230d1b5318b91653b360632bdc4326a30921a1ab167d4303c24cb5d5351fb30847dac35f85e6321275d4084ac68d74947f1050a6997ee45f49219f4f66d59431616d80cae7", 0xce, 0x5, &(0x7f0000000080)={0x77359400}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:51:21 executing program 0: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20\x00', 0x3, 0x0) write$P9_RRENAMEAT(r0, &(0x7f0000000080)={0x7, 0x4b, 0x2}, 0x7) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000005c0)={'team0\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f0000000600)={@dev={0xfe, 0x80, [], 0x1d}, r3}, 0x14) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2000001}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x48, r2, 0xf04, 0x70bd26, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1000}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_NODE={0xc, 0x6, [@TIPC_NLA_NODE_ADDR={0x8}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x20000800) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'ip6gretap0\x00', 0x2}) connect$bt_rfcomm(r0, &(0x7f0000000240)={0x1f, {0x81, 0x200, 0x100000000, 0x20e, 0x7fff, 0x84}, 0x6}, 0xa) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r0, 0x5386, &(0x7f0000000280)) 15:51:21 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, 0x0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) [ 960.181795][ T3442] loop2: p1 [ 960.185084][ T3442] loop2: partition table partially beyond EOD, truncated [ 960.192373][ T3442] loop2: p1 start 1 is beyond EOD, truncated [ 960.205620][ T3441] loop1: p1 p2 15:51:21 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000007000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:21 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x4, 0x201) getsockopt$IP_VS_SO_GET_DESTS(r1, 0x0, 0x484, &(0x7f0000000080)=""/4, &(0x7f00000000c0)=0x4) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:51:21 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000008000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:21 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, 0x0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:21 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000048000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:21 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000000400000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:21 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) readahead(r0, 0x5, 0x400000000000000) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x600180, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in=@multicast1, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@dev}}, &(0x7f0000000280)=0xe8) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000002c0)={r2, @broadcast, @dev={0xac, 0x14, 0x14, 0x13}}, 0xc) 15:51:21 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, 0x0, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:21 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$UI_SET_PROPBIT(r0, 0x4004556e, 0x7) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) r2 = request_key(&(0x7f0000000080)='encrypted\x00', &(0x7f00000000c0)={'syz', 0x3}, &(0x7f0000000140)='teql0\x00', 0xfffffffffffffff8) keyctl$setperm(0x5, r2, 0x100002) ioctl$KVM_TRANSLATE(r0, 0xc018ae85, &(0x7f00000001c0)={0x6000, 0x2, 0x7, 0x7, 0x1000}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCGIFDSTADDR(r3, 0x8917, &(0x7f0000000040)={'teql0\x00', {0x2, 0x4e20, @rand_addr=0x850}}) [ 960.592910][ T3485] loop1: p1 p2 15:51:21 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:21 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'/fb0\x00', 0x2}) 15:51:21 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) [ 960.781625][ T3493] loop2: p1 [ 960.784949][ T3493] loop2: partition table partially beyond EOD, truncated [ 960.792173][ T3493] loop2: p1 start 1 is beyond EOD, truncated [ 960.823192][ T3481] loop5: p1 15:51:21 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000008000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:21 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700004c000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:21 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000000000000000000000000005c0000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:21 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newqdisc={0x24, 0x5e, 0x7, 0x0, 0x0, {0x0, r2}}, 0x24}}, 0x0) 15:51:21 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0}, &(0x7f0000000740)=""/243, 0x34b, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:21 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000009000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:22 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, 0x0, 0x0, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newqdisc={0x24, 0x5e, 0x7, 0x0, 0x0, {0x0, r2}}, 0x24}}, 0x0) 15:51:22 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, 0x0, 0x0, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newqdisc={0x24, 0x5e, 0x7, 0x0, 0x0, {0x0, r2}}, 0x24}}, 0x0) 15:51:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newqdisc={0x24, 0x5e, 0x7, 0x0, 0x0, {0x0, r2}}, 0x24}}, 0x0) 15:51:22 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newqdisc={0x24, 0x5e, 0x7}, 0x24}}, 0x0) [ 961.329458][ T3538] loop1: p1 p2 [ 961.329988][ T3542] loop2: p1 [ 961.336245][ T3542] loop2: partition table partially beyond EOD, truncated [ 961.343502][ T3542] loop2: p1 start 1 is beyond EOD, truncated [ 961.389132][ T3539] loop5: p1 15:51:22 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000009000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:22 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700005c000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:22 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newqdisc={0x24, 0x5e, 0x7}, 0x24}}, 0x0) 15:51:22 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, 0x0, 0x0, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}, &(0x7f0000000700)}) 15:51:22 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000000000000000a000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:22 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000200000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:22 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newqdisc={0x24, 0x5e, 0x7}, 0x24}}, 0x0) 15:51:22 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0xf3, 0x0) 15:51:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newqdisc={0x24, 0x5e, 0x7, 0x0, 0x0, {0x0, r1}}, 0x24}}, 0x0) 15:51:22 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0xf3, 0x0) 15:51:22 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newqdisc={0x24, 0x5e, 0x7, 0x0, 0x0, {0x0, r1}}, 0x24}}, 0x0) [ 961.775579][ T3577] loop5: p1 [ 961.816186][ T3575] loop1: p1 15:51:22 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0xf3, 0x0) [ 961.863207][ T3595] print_req_error: 767 callbacks suppressed [ 961.863220][ T3595] blk_update_request: I/O error, dev loop5, sector 1 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 961.882830][ T2515] blk_update_request: I/O error, dev loop5, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 961.893762][ T2515] buffer_io_error: 766 callbacks suppressed [ 961.893769][ T2515] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 961.907711][ T2515] blk_update_request: I/O error, dev loop5, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 961.918587][ T2515] Buffer I/O error on dev loop5p1, logical block 1, async page read [ 961.926643][ T2515] blk_update_request: I/O error, dev loop5, sector 3 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 961.937529][ T2515] Buffer I/O error on dev loop5p1, logical block 2, async page read [ 961.945601][ T2515] blk_update_request: I/O error, dev loop5, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 961.956723][ T2515] Buffer I/O error on dev loop5p1, logical block 3, async page read [ 961.964806][ T2515] blk_update_request: I/O error, dev loop5, sector 5 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 961.975716][ T2515] Buffer I/O error on dev loop5p1, logical block 4, async page read [ 961.983808][ T2515] blk_update_request: I/O error, dev loop5, sector 6 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 961.994698][ T2515] Buffer I/O error on dev loop5p1, logical block 5, async page read [ 962.002765][ T2515] blk_update_request: I/O error, dev loop5, sector 7 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 962.013813][ T2515] Buffer I/O error on dev loop5p1, logical block 6, async page read [ 962.021846][ T2515] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 962.032722][ T2515] Buffer I/O error on dev loop5p1, logical block 7, async page read [ 962.042139][ T2515] blk_update_request: I/O error, dev loop5, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 962.053084][ T2515] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 962.061203][ T2515] Buffer I/O error on dev loop5p1, logical block 1, async page read [ 962.102233][ T3577] __loop_clr_fd: partition scan of loop5 failed (rc=-16) [ 962.165666][ T3584] loop2: p1 [ 962.168926][ T3584] loop2: partition table partially beyond EOD, truncated [ 962.176201][ T3584] loop2: p1 start 1 is beyond EOD, truncated 15:51:23 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000000000a000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:23 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0xf3, &(0x7f0000000700)={0x0, &(0x7f0000000700)}) 15:51:23 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newqdisc={0x24, 0x5e, 0x7, 0x0, 0x0, {0x0, r1}}, 0x24}}, 0x0) 15:51:23 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000000000000000b000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:23 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000300000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:23 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000060000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:23 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newqdisc={0x24, 0x5e, 0x7, 0x0, 0x0, {0x0, r1}}, 0x24}}, 0x0) 15:51:23 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0xf3, &(0x7f0000000700)={0x0, &(0x7f0000000700)}) 15:51:23 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newqdisc={0x24, 0x5e, 0x7, 0x0, 0x0, {0x0, r1}}, 0x24}}, 0x0) [ 962.575720][ T3619] loop5: p1 15:51:23 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newqdisc={0x24, 0x5e, 0x7, 0x0, 0x0, {0x0, r1}}, 0x24}}, 0x0) 15:51:23 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0xf3, &(0x7f0000000700)={0x0, &(0x7f0000000700)}) 15:51:23 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newqdisc={0x24, 0x5e, 0x7, 0x0, 0x0, {0x0, r1}}, 0x24}}, 0x0) [ 962.663067][ T3623] loop1: p1 [ 962.709647][ T3628] loop2: p1 [ 962.713003][ T3628] loop2: partition table partially beyond EOD, truncated [ 962.720218][ T3628] loop2: p1 start 1 is beyond EOD, truncated 15:51:23 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000000000b000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:23 executing program 3: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe27da2a9d5ba9ff3c009d308bd73f4772539", 0xc0, 0xfffffffffffffffe) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = add_key$user(&(0x7f0000003f40)='user\x00', &(0x7f00000005c0)={'syz'}, &(0x7f0000000100)='\x00', 0x1, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f0000000580)={r2, r0, r0}, &(0x7f0000000740)=""/243, 0xf3, &(0x7f0000000700)={&(0x7f00000001c0)={'sm3\x00\x0f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00\x00\x00\x00\x00\x00\x00\x02\x00'}}) 15:51:23 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newqdisc={0x24, 0x5e, 0x7, 0x0, 0x0, {0x0, r1}}, 0x24}}, 0x0) 15:51:23 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000000000000000c000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:23 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000068000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:23 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000400000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:23 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newqdisc={0x24, 0x5e, 0x7, 0x0, 0x0, {0x0, r1}}, 0x24}}, 0x0) 15:51:23 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001c008105e00f80ecdb4cb9f207c804a01a000000880344fb0a000200400ada1b40d805000300c50083b8", 0x2e}], 0x1}, 0x0) 15:51:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newqdisc={0x24, 0x5e, 0x7}, 0x24}}, 0x0) [ 963.099987][ T3680] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.3'. 15:51:24 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700006c000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:24 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001c008105e00f80ecdb4cb9f207c804a01a000000880344fb0a000200400ada1b40d805000300c50083b8", 0x2e}], 0x1}, 0x0) 15:51:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newqdisc={0x24, 0x5e, 0x7}, 0x24}}, 0x0) [ 963.227464][ T3669] loop2: p1 [ 963.230705][ T3669] loop2: partition table partially beyond EOD, truncated [ 963.237946][ T3669] loop2: p1 start 1 is beyond EOD, truncated [ 963.257623][ T3668] loop1: p1 [ 963.299211][ T3692] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.3'. [ 963.322527][ T3671] loop5: p1 15:51:24 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000041a9e50b000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newqdisc={0x24, 0x5e, 0x7}, 0x24}}, 0x0) 15:51:24 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001c008105e00f80ecdb4cb9f207c804a01a000000880344fb0a000200400ada1b40d805000300c50083b8", 0x2e}], 0x1}, 0x0) 15:51:24 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000000000000000d000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:24 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000500000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newqdisc={0x24, 0x5e, 0x7, 0x0, 0x0, {0x0, r1}}, 0x24}}, 0x0) 15:51:24 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001c008105e00f80ecdb4cb9f207c804a01a000000880344fb0a000200400ada1b40d805000300c50083b8", 0x2e}], 0x1}, 0x0) [ 963.559667][ T3706] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.3'. 15:51:24 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000074000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newqdisc={0x24, 0x5e, 0x7, 0x0, 0x0, {0x0, r1}}, 0x24}}, 0x0) [ 963.716232][ T3724] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.3'. [ 963.773651][ T3710] loop1: p1 15:51:24 executing program 3: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001c008105e00f80ecdb4cb9f207c804a01a000000880344fb0a000200400ada1b40d805000300c50083b8", 0x2e}], 0x1}, 0x0) 15:51:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newqdisc={0x24, 0x5e, 0x7, 0x0, 0x0, {0x0, r1}}, 0x24}}, 0x0) 15:51:24 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00'}) sendmsg$nl_route_sched(r1, 0x0, 0x0) [ 963.872619][ T3716] Dev loop2: unable to read RDB block 1 [ 963.878412][ T3716] loop2: unable to read partition table [ 963.884158][ T3716] loop2: partition table beyond EOD, truncated [ 963.890340][ T3716] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 963.973291][ T3715] loop5: p1 15:51:25 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000000000c000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:25 executing program 3: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001c008105e00f80ecdb4cb9f207c804a01a000000880344fb0a000200400ada1b40d805000300c50083b8", 0x2e}], 0x1}, 0x0) 15:51:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00'}) sendmsg$nl_route_sched(r1, 0x0, 0x0) 15:51:25 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000000ca5e600d000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:25 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000600000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:25 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700007a000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:25 executing program 3: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001c008105e00f80ecdb4cb9f207c804a01a000000880344fb0a000200400ada1b40d805000300c50083b8", 0x2e}], 0x1}, 0x0) 15:51:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00'}) sendmsg$nl_route_sched(r1, 0x0, 0x0) 15:51:25 executing program 3: r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001c008105e00f80ecdb4cb9f207c804a01a000000880344fb0a000200400ada1b40d805000300c50083b8", 0x2e}], 0x1}, 0x0) 15:51:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00'}) sendmsg$nl_route_sched(r1, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) [ 964.432608][ T3757] loop1: p1 15:51:25 executing program 3: r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001c008105e00f80ecdb4cb9f207c804a01a000000880344fb0a000200400ada1b40d805000300c50083b8", 0x2e}], 0x1}, 0x0) 15:51:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00'}) sendmsg$nl_route_sched(r1, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) [ 964.536933][ T3767] loop5: p1 [ 964.625217][ T3763] loop2: p1 [ 964.628517][ T3763] loop2: partition table partially beyond EOD, truncated [ 964.635912][ T3763] loop2: p1 start 1 is beyond EOD, truncated 15:51:25 executing program 3: r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001c008105e00f80ecdb4cb9f207c804a01a000000880344fb0a000200400ada1b40d805000300c50083b8", 0x2e}], 0x1}, 0x0) 15:51:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00'}) sendmsg$nl_route_sched(r1, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) 15:51:25 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000700000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:25 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000090000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:25 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000000000d000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:25 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000000000000000e000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:25 executing program 3: socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001c008105e00f80ecdb4cb9f207c804a01a000000880344fb0a000200400ada1b40d805000300c50083b8", 0x2e}], 0x1}, 0x0) 15:51:25 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00'}) sendmsg$nl_route_sched(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 15:51:25 executing program 3: socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001c008105e00f80ecdb4cb9f207c804a01a000000880344fb0a000200400ada1b40d805000300c50083b8", 0x2e}], 0x1}, 0x0) [ 965.011976][ T3797] loop5: p1 15:51:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00'}) sendmsg$nl_route_sched(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 15:51:26 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000010000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:26 executing program 3: socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001c008105e00f80ecdb4cb9f207c804a01a000000880344fb0a000200400ada1b40d805000300c50083b8", 0x2e}], 0x1}, 0x0) 15:51:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00'}) sendmsg$nl_route_sched(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 15:51:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newqdisc={0x24, 0x5e, 0x0, 0x0, 0x0, {0x0, r2}}, 0x24}}, 0x0) [ 965.212086][ T3809] loop2: p1 [ 965.215335][ T3809] loop2: partition table partially beyond EOD, truncated [ 965.222806][ T3809] loop2: p1 start 1 is beyond EOD, truncated [ 965.275680][ T3801] loop1: p1 15:51:26 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000800000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:26 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000000000e000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newqdisc={0x24, 0x5e, 0x0, 0x0, 0x0, {0x0, r2}}, 0x24}}, 0x0) 15:51:26 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000004020000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:26 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, 0x0, 0x0) 15:51:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newqdisc={0x24, 0x5e, 0x0, 0x0, 0x0, {0x0, r2}}, 0x24}}, 0x0) 15:51:26 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, 0x0, 0x0) [ 965.509858][ T3835] loop5: p1 15:51:26 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000011000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00'}) sendmsg$nl_route_sched(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newqdisc={0x24, 0x5e, 0x7}, 0x24}}, 0x0) 15:51:26 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, 0x0, 0x0) [ 965.631875][ T3848] loop2: p1 [ 965.635179][ T3848] loop2: partition table partially beyond EOD, truncated [ 965.642537][ T3848] loop2: p1 start 1 is beyond EOD, truncated 15:51:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00'}) sendmsg$nl_route_sched(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newqdisc={0x24, 0x5e, 0x7}, 0x24}}, 0x0) 15:51:26 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00'}) sendmsg$nl_route_sched(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newqdisc={0x24, 0x5e, 0x7}, 0x24}}, 0x0) [ 965.859511][ T3852] loop1: p1 [ 965.940991][ T3867] loop5: p1 15:51:27 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000900000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:27 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000010000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:27 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 15:51:27 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) r1 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) bind$pptp(r1, 0x0, 0x0) 15:51:27 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000a8020000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:27 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000012000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:27 executing program 0: r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000340)={0x0, {{0x2, 0x0, @dev}}, {{0x2, 0x0, @loopback}}}, 0x108) 15:51:27 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 15:51:27 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000180)) recvfrom$inet6(r0, &(0x7f0000000000)=""/95, 0x5f, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) tkill(r1, 0x1000000000015) 15:51:27 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 15:51:27 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000aa020000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 966.362454][ T3893] loop2: p1 [ 966.365785][ T3893] loop2: partition table partially beyond EOD, truncated [ 966.373056][ T3893] loop2: p1 start 1 is beyond EOD, truncated 15:51:27 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)}, 0x0) [ 966.482341][ T3900] loop1: p1 [ 966.482893][ T3905] loop5: p1 15:51:27 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000a00000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:27 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000011000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:27 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)}, 0x0) 15:51:27 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000014000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:27 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000030000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:27 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)}, 0x0) [ 966.852402][ T3938] loop1: p1 15:51:27 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) [ 966.922879][ T3932] loop2: p1 [ 966.926329][ T3932] loop2: partition table partially beyond EOD, truncated [ 966.933593][ T3932] loop2: p1 start 1 is beyond EOD, truncated 15:51:27 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000b00000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 967.014607][ T3945] loop5: p1 [ 967.118944][ T3958] print_req_error: 767 callbacks suppressed [ 967.118955][ T3958] blk_update_request: I/O error, dev loop5, sector 1 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 967.141128][ T2516] blk_update_request: I/O error, dev loop5, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 967.151869][ T3945] __loop_clr_fd: partition scan of loop5 failed (rc=-16) [ 967.152044][ T2516] buffer_io_error: 766 callbacks suppressed [ 967.152058][ T2516] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 967.173077][ T2516] blk_update_request: I/O error, dev loop5, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 967.183998][ T2516] Buffer I/O error on dev loop5p1, logical block 1, async page read [ 967.192076][ T2516] blk_update_request: I/O error, dev loop5, sector 3 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 967.202986][ T2516] Buffer I/O error on dev loop5p1, logical block 2, async page read [ 967.211031][ T2516] blk_update_request: I/O error, dev loop5, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 967.222159][ T2516] Buffer I/O error on dev loop5p1, logical block 3, async page read [ 967.230182][ T2516] blk_update_request: I/O error, dev loop5, sector 5 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 967.241185][ T2516] Buffer I/O error on dev loop5p1, logical block 4, async page read [ 967.249200][ T2516] blk_update_request: I/O error, dev loop5, sector 6 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 967.260115][ T2516] Buffer I/O error on dev loop5p1, logical block 5, async page read 15:51:28 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) write$FUSE_DIRENTPLUS(r3, &(0x7f0000002380)=ANY=[@ANYBLOB='P'], 0x1) read$FUSE(r2, &(0x7f0000001340), 0x1000) close(r1) 15:51:28 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) [ 967.268149][ T2516] blk_update_request: I/O error, dev loop5, sector 7 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 967.279060][ T2516] Buffer I/O error on dev loop5p1, logical block 6, async page read [ 967.287094][ T2516] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 967.297990][ T2516] Buffer I/O error on dev loop5p1, logical block 7, async page read [ 967.308227][ T2516] blk_update_request: I/O error, dev loop5, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 967.312853][ T3954] loop4: p1 [ 967.319281][ T2516] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 967.330387][ T2516] Buffer I/O error on dev loop5p1, logical block 1, async page read 15:51:28 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000012000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:28 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000000000000001f000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:28 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{0x0}], 0x1}, 0x0) [ 967.466556][ T3967] loop1: p1 15:51:28 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)}], 0x1}, 0x0) 15:51:28 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000c00000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:28 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000002040000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:28 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) write$FUSE_DIRENTPLUS(r3, &(0x7f0000002380)=ANY=[@ANYBLOB='P'], 0x1) read$FUSE(r2, &(0x7f0000001340), 0x1000) close(r1) 15:51:28 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)}], 0x1}, 0x0) [ 967.717602][ T3989] loop2: p1 [ 967.720969][ T3989] loop2: partition table partially beyond EOD, truncated [ 967.728373][ T3989] loop2: p1 start 1 is beyond EOD, truncated [ 967.776512][ T3988] loop5: p1 15:51:28 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)}], 0x1}, 0x0) 15:51:28 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000014000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:28 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) write$FUSE_DIRENTPLUS(r3, &(0x7f0000002380)=ANY=[@ANYBLOB='P'], 0x1) read$FUSE(r2, &(0x7f0000001340), 0x1000) close(r1) 15:51:28 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000006040000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 967.925212][ T4001] loop1: p1 15:51:28 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000d00000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:28 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000020000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:28 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001c008105e00f80ecdb4cb9f207c804a01a0000", 0x17}], 0x1}, 0x0) 15:51:29 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) write$FUSE_DIRENTPLUS(r3, &(0x7f0000002380)=ANY=[@ANYBLOB='P'], 0x1) read$FUSE(r2, &(0x7f0000001340), 0x1000) close(r1) [ 968.174066][ T4018] loop2: p1 [ 968.177401][ T4018] loop2: partition table partially beyond EOD, truncated [ 968.184707][ T4018] loop2: p1 start 1 is beyond EOD, truncated 15:51:29 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001c008105e00f80ecdb4cb9f207c804a01a0000", 0x17}], 0x1}, 0x0) [ 968.353353][ T4034] loop1: p1 15:51:29 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000050000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:29 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000000001f000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 968.384990][ T4032] loop5: p1 15:51:29 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x8ec0, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000002380)=ANY=[@ANYBLOB='P'], 0x1) read$FUSE(r1, &(0x7f0000001340), 0x1000) 15:51:29 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001c008105e00f80ecdb4cb9f207c804a01a0000", 0x17}], 0x1}, 0x0) [ 968.445147][ T4034] __loop_clr_fd: partition scan of loop1 failed (rc=-16) 15:51:29 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000025000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:29 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000e00000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:29 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001c008105e00f80ecdb4cb9f207c804a01a000000880344fb0a000200400ada", 0x23}], 0x1}, 0x0) 15:51:29 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001c008105e00f80ecdb4cb9f207c804a01a000000880344fb0a000200400ada", 0x23}], 0x1}, 0x0) 15:51:29 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001c008105e00f80ecdb4cb9f207c804a01a000000880344fb0a000200400ada", 0x23}], 0x1}, 0x0) [ 968.756856][ T4068] loop2: p1 [ 968.760178][ T4068] loop2: partition table partially beyond EOD, truncated [ 968.767460][ T4068] loop2: p1 start 1 is beyond EOD, truncated [ 968.850973][ T4067] loop4: p1 15:51:29 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001c008105e00f80ecdb4cb9f207c804a01a000000880344fb0a000200400ada1b40d8050003", 0x29}], 0x1}, 0x0) 15:51:29 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000020000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 969.050822][ T4075] loop5: p1 [ 969.051026][ T4074] loop1: p1 15:51:30 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000060000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:30 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000001000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:30 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001c008105e00f80ecdb4cb9f207c804a01a000000880344fb0a000200400ada1b40d8050003", 0x29}], 0x1}, 0x0) 15:51:30 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x8ec0, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000002380)=ANY=[@ANYBLOB='P'], 0x1) read$FUSE(r1, &(0x7f0000001340), 0x1000) 15:51:30 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000000000000003f000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:30 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001c008105e00f80ecdb4cb9f207c804a01a000000880344fb0a000200400ada1b40d8050003", 0x29}], 0x1}, 0x0) [ 969.374408][ T4097] loop2: p1 [ 969.377726][ T4097] loop2: partition table partially beyond EOD, truncated [ 969.385165][ T4097] loop2: p1 start 1 is beyond EOD, truncated 15:51:30 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001c008105e00f80ecdb4cb9f207c804a01a000000880344fb0a000200400ada1b40d805000300c500", 0x2c}], 0x1}, 0x0) 15:51:30 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000025000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 969.514994][ T4105] loop4: p1 15:51:30 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001c008105e00f80ecdb4cb9f207c804a01a000000880344fb0a000200400ada1b40d805000300c500", 0x2c}], 0x1}, 0x0) [ 969.592249][ T4110] loop1: p1 [ 969.673789][ T4105] __loop_clr_fd: partition scan of loop4 failed (rc=-16) [ 969.717958][ T4119] loop5: p1 15:51:30 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000001100000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:30 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000040000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:30 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000004060000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:30 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001c008105e00f80ecdb4cb9f207c804a01a000000880344fb0a000200400ada1b40d805000300c500", 0x2c}], 0x1}, 0x0) [ 969.813223][ T4133] loop2: p1 [ 969.816598][ T4133] loop2: partition table partially beyond EOD, truncated [ 969.824069][ T4133] loop2: p1 start 1 is beyond EOD, truncated 15:51:30 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001c008105e00f80ecdb4cb9f207c804a01a000000880344fb0a000200400ada1b40d805000300c50083", 0x2d}], 0x1}, 0x0) 15:51:30 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000000003f000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 970.012253][ T4145] loop1: p1 [ 970.071973][ T4150] loop5: p1 15:51:31 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x8ec0, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000002380)=ANY=[@ANYBLOB='P'], 0x1) read$FUSE(r1, &(0x7f0000001340), 0x1000) 15:51:31 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001c008105e00f80ecdb4cb9f207c804a01a000000880344fb0a000200400ada1b40d805000300c50083", 0x2d}], 0x1}, 0x0) 15:51:31 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000001200000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:31 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000000000be5a941000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:31 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="2e0000001c008105e00f80ecdb4cb9f207c804a01a000000880344fb0a000200400ada1b40d805000300c50083", 0x2d}], 0x1}, 0x0) 15:51:31 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000070000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 970.261668][ T4162] loop2: p1 [ 970.265094][ T4162] loop2: partition table partially beyond EOD, truncated [ 970.272458][ T4162] loop2: p1 start 1 is beyond EOD, truncated 15:51:31 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000040000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:31 executing program 3: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) write$FUSE_DIRENTPLUS(r3, &(0x7f0000002380)=ANY=[@ANYBLOB='P'], 0x1) read$FUSE(r2, &(0x7f0000001340), 0x1000) close(r1) [ 970.566834][ T4177] loop1: p1 [ 970.622080][ T4185] loop5: p1 15:51:31 executing program 3: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) write$FUSE_DIRENTPLUS(r3, &(0x7f0000002380)=ANY=[@ANYBLOB='P'], 0x1) read$FUSE(r2, &(0x7f0000001340), 0x1000) close(r1) 15:51:31 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000002500000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:31 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000042000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 970.785346][ T4184] loop4: p1 [ 970.790191][ T4191] loop2: p1 [ 970.793581][ T4191] loop2: partition table partially beyond EOD, truncated [ 970.800894][ T4191] loop2: p1 start 1 is beyond EOD, truncated 15:51:31 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000090000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 970.983196][ T4212] loop1: p1 15:51:32 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) read$FUSE(r2, &(0x7f0000001340), 0x1000) close(r1) 15:51:32 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000be5a941000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:32 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000150081f87059ae08060c040002ff0f02000000000000018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8ff5314461", 0x4c}], 0x1}, 0x0) close(r1) [ 971.113182][ T4217] loop5: p1 15:51:32 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000005c00000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 971.163932][ T4221] loop4: p1 15:51:32 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000150081f87059ae08060c040002ff0f02000000000000018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8ff5314461", 0x4c}], 0x1}, 0x0) close(r1) 15:51:32 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000f43000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:32 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000a0000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:32 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000150081f87059ae08060c040002ff0f02000000000000018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8ff5314461", 0x4c}], 0x1}, 0x0) close(r1) [ 971.350139][ T4230] Dev loop2: unable to read RDB block 1 [ 971.355983][ T4230] loop2: unable to read partition table [ 971.361889][ T4230] loop2: partition table beyond EOD, truncated [ 971.368063][ T4230] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 971.480507][ T4245] loop1: p1 15:51:32 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000150081f87059ae08060c040002ff0f02000000000000018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8ff5314461", 0x4c}], 0x1}, 0x0) close(r1) [ 971.562632][ T4253] loop5: p1 15:51:32 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000003000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:32 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000042000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:32 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000048000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 971.669297][ T4257] loop4: p1 [ 971.943850][ T4276] loop1: p1 p2 15:51:32 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) read$FUSE(r2, &(0x7f0000001340), 0x1000) close(r1) 15:51:32 executing program 3: socket$kcm(0x10, 0x2, 0x4) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = socket$kcm(0x2, 0x3, 0x2) close(r0) 15:51:32 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000b0000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 971.973805][ T4273] loop5: p1 15:51:33 executing program 3: socket$kcm(0x10, 0x2, 0x4) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = socket$kcm(0x2, 0x3, 0x2) close(r0) [ 972.102769][ T4275] loop2: p1 [ 972.106040][ T4275] loop2: partition table partially beyond EOD, truncated [ 972.113417][ T4275] loop2: p1 start 1 is beyond EOD, truncated 15:51:33 executing program 3: socket$kcm(0x10, 0x2, 0x4) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) r0 = socket$kcm(0x2, 0x3, 0x2) close(r0) 15:51:33 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000000000000004c000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:33 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000005000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:33 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000150081f87059ae08060c040002ff0f02000000000000018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8ff5314461", 0x4c}], 0x1}, 0x0) close(0xffffffffffffffff) [ 972.173276][ T4291] loop4: p1 15:51:33 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000f43000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 972.332685][ T4306] loop5: p1 15:51:33 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000150081f87059ae08060c040002ff0f02000000000000018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8ff5314461", 0x4c}], 0x1}, 0x0) close(0xffffffffffffffff) 15:51:33 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000c0000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 972.417007][ T4309] loop1: p1 p2 15:51:33 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000000000000005c000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 972.482395][ T4316] loop2: p1 [ 972.485726][ T4316] loop2: partition table partially beyond EOD, truncated [ 972.493008][ T4316] loop2: p1 start 1 is beyond EOD, truncated [ 972.662609][ T4331] loop4: p1 [ 972.724983][ T4336] loop5: p1 15:51:33 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) read$FUSE(r2, &(0x7f0000001340), 0x1000) close(r1) 15:51:33 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000048000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:33 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000150081f87059ae08060c040002ff0f02000000000000018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8ff5314461", 0x4c}], 0x1}, 0x0) close(0xffffffffffffffff) 15:51:33 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000006000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:33 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000d0000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:33 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000060000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:33 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000150081f87059ae08060c040002ff0f02000000000000018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8ff5314461", 0x4c}], 0x1}, 0x0) close(r1) 15:51:34 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000150081f87059ae08060c040002ff0f02000000000000018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8ff5314461", 0x4c}], 0x1}, 0x0) close(r0) [ 973.072859][ T4354] loop1: p1 p2 15:51:34 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000150081f87059ae08060c040002ff0f02000000000000018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8ff5314461", 0x4c}], 0x1}, 0x0) close(r0) 15:51:34 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000007000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 973.186010][ T4355] loop4: p1 [ 973.191639][ T4353] loop2: p1 [ 973.194940][ T4353] loop2: partition table partially beyond EOD, truncated [ 973.202219][ T4353] loop2: p1 start 1 is beyond EOD, truncated [ 973.223216][ T4359] loop5: p1 15:51:34 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000068000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:34 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000e0000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 973.632136][ T4384] loop1: p1 p2 15:51:34 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_DIRENTPLUS(r2, &(0x7f0000002380)=ANY=[@ANYBLOB='P'], 0x1) read$FUSE(r1, &(0x7f0000001340), 0x1000) close(r0) 15:51:34 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000000004c000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:34 executing program 3: r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000150081f87059ae08060c040002ff0f02000000000000018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8ff5314461", 0x4c}], 0x1}, 0x0) close(r0) [ 973.755998][ T4390] loop4: p1 [ 973.814704][ T4392] loop5: p1 15:51:34 executing program 3: r0 = socket$kcm(0x10, 0x0, 0x4) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000150081f87059ae08060c040002ff0f02000000000000018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8ff5314461", 0x4c}], 0x1}, 0x0) close(r1) 15:51:34 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000009000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:34 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_DIRENTPLUS(r2, &(0x7f0000002380)=ANY=[@ANYBLOB='P'], 0x1) read$FUSE(r1, &(0x7f0000001340), 0x1000) close(r0) 15:51:34 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000430f0000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:34 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000000000000006c000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 973.986846][ T4402] loop2: p1 [ 973.990188][ T4402] loop2: partition table partially beyond EOD, truncated [ 973.997582][ T4402] loop2: p1 start 1 is beyond EOD, truncated 15:51:35 executing program 3: r0 = socket$kcm(0x10, 0x0, 0x4) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000150081f87059ae08060c040002ff0f02000000000000018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8ff5314461", 0x4c}], 0x1}, 0x0) close(r1) 15:51:35 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_DIRENTPLUS(r2, &(0x7f0000002380)=ANY=[@ANYBLOB='P'], 0x1) read$FUSE(r1, &(0x7f0000001340), 0x1000) close(r0) 15:51:35 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000000005c000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:35 executing program 3: r0 = socket$kcm(0x10, 0x0, 0x4) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000150081f87059ae08060c040002ff0f02000000000000018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8ff5314461", 0x4c}], 0x1}, 0x0) close(r1) [ 974.223902][ T4414] loop1: p1 p2 15:51:35 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x8ec0, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000002380)=ANY=[@ANYBLOB='P'], 0x1) read$FUSE(0xffffffffffffffff, &(0x7f0000001340), 0x1000) close(r1) 15:51:35 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x2, 0x0, 0x2) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000150081f87059ae08060c040002ff0f02000000000000018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8ff5314461", 0x4c}], 0x1}, 0x0) close(r1) [ 974.372853][ T4426] loop5: p1 15:51:35 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000000000000000000000000000a000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:35 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000110000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:35 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x8ec0, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000002380)=ANY=[@ANYBLOB='P'], 0x1) read$FUSE(0xffffffffffffffff, &(0x7f0000001340), 0x1000) close(r1) [ 974.478737][ T4441] loop2: p1 [ 974.482173][ T4441] loop2: partition table partially beyond EOD, truncated [ 974.489353][ T4441] loop2: p1 start 1 is beyond EOD, truncated 15:51:35 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x2, 0x0, 0x2) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000150081f87059ae08060c040002ff0f02000000000000018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8ff5314461", 0x4c}], 0x1}, 0x0) close(r1) 15:51:35 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000074000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:35 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x8ec0, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000002380)=ANY=[@ANYBLOB='P'], 0x1) read$FUSE(0xffffffffffffffff, &(0x7f0000001340), 0x1000) close(r1) 15:51:35 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000060000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:35 executing program 0: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x8ec0, 0x0) write$FUSE_DIRENTPLUS(r1, &(0x7f0000002380)=ANY=[@ANYBLOB='P'], 0x1) read$FUSE(r0, &(0x7f0000001340), 0x1000) close(0xffffffffffffffff) [ 974.712732][ T4457] loop1: p1 p2 [ 974.774734][ T4465] loop4: p1 15:51:35 executing program 0: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x8ec0, 0x0) write$FUSE_DIRENTPLUS(r1, &(0x7f0000002380)=ANY=[@ANYBLOB='P'], 0x1) read$FUSE(r0, &(0x7f0000001340), 0x1000) close(0xffffffffffffffff) 15:51:35 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x2, 0x0, 0x2) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000150081f87059ae08060c040002ff0f02000000000000018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8ff5314461", 0x4c}], 0x1}, 0x0) close(r1) 15:51:35 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000000000000000000000000000b000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:35 executing program 0: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x8ec0, 0x0) write$FUSE_DIRENTPLUS(r1, &(0x7f0000002380)=ANY=[@ANYBLOB='P'], 0x1) read$FUSE(r0, &(0x7f0000001340), 0x1000) close(0xffffffffffffffff) [ 974.913393][ T4473] loop5: p1 15:51:35 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000120000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 974.977743][ T4477] loop2: p1 [ 974.981117][ T4477] loop2: partition table partially beyond EOD, truncated [ 974.988316][ T4477] loop2: p1 start 1 is beyond EOD, truncated 15:51:35 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) write$FUSE_DIRENTPLUS(r3, &(0x7f0000002380)=ANY=[@ANYBLOB='P'], 0x1) read$FUSE(r2, &(0x7f0000001340), 0x1000) close(r1) 15:51:36 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000000000000007a000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:36 executing program 3: socket$kcm(0x10, 0x2, 0x4) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000150081f87059ae08060c040002ff0f02000000000000018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8ff5314461", 0x4c}], 0x1}, 0x0) close(r0) 15:51:36 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000068000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:36 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) write$FUSE_DIRENTPLUS(r3, &(0x7f0000002380)=ANY=[@ANYBLOB='P'], 0x1) read$FUSE(r2, &(0x7f0000001340), 0x1000) close(r1) 15:51:36 executing program 3: socket$kcm(0x10, 0x2, 0x4) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000150081f87059ae08060c040002ff0f02000000000000018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8ff5314461", 0x4c}], 0x1}, 0x0) close(r0) [ 975.234388][ T4504] loop1: p1 p2 [ 975.277582][ T4505] loop4: p1 15:51:36 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) write$FUSE_DIRENTPLUS(r3, &(0x7f0000002380)=ANY=[@ANYBLOB='P'], 0x1) read$FUSE(r2, &(0x7f0000001340), 0x1000) close(r1) 15:51:36 executing program 3: socket$kcm(0x10, 0x2, 0x4) r0 = socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000150081f87059ae08060c040002ff0f02000000000000018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8ff5314461", 0x4c}], 0x1}, 0x0) close(r0) 15:51:36 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x8ec0, 0x0) write$FUSE_DIRENTPLUS(r1, &(0x7f0000002380)=ANY=[@ANYBLOB='P'], 0x1) read$FUSE(r0, &(0x7f0000001340), 0x1000) close(0xffffffffffffffff) 15:51:36 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000000000000000000000000000c000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:36 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x8ec0, 0x0) write$FUSE_DIRENTPLUS(r1, &(0x7f0000002380)=ANY=[@ANYBLOB='P'], 0x1) read$FUSE(r0, &(0x7f0000001340), 0x1000) close(0xffffffffffffffff) [ 975.462683][ T4510] loop5: p1 15:51:36 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000140000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:36 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(r0, 0x0, 0x0) close(r1) [ 975.507001][ T4515] loop2: p1 [ 975.510291][ T4515] loop2: partition table partially beyond EOD, truncated [ 975.517548][ T4515] loop2: p1 start 1 is beyond EOD, truncated 15:51:36 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000080000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:36 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r1, 0x0, 0x8ec0, 0x0) write$FUSE_DIRENTPLUS(r1, &(0x7f0000002380)=ANY=[@ANYBLOB='P'], 0x1) read$FUSE(r0, &(0x7f0000001340), 0x1000) close(0xffffffffffffffff) 15:51:36 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000000006c000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:36 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(r0, 0x0, 0x0) close(r1) 15:51:36 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x8ec0, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000002380)=ANY=[@ANYBLOB='P'], 0x1) read$FUSE(0xffffffffffffffff, &(0x7f0000001340), 0x1000) close(r1) [ 975.734694][ T4539] loop4: p1 15:51:36 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(r0, 0x0, 0x0) close(r1) [ 975.850278][ T4543] loop1: p1 p2 15:51:36 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x8ec0, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000002380)=ANY=[@ANYBLOB='P'], 0x1) read$FUSE(0xffffffffffffffff, &(0x7f0000001340), 0x1000) close(r1) 15:51:36 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000001f0000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 975.941910][ T4560] loop5: p1 [ 976.124418][ T4561] loop2: p1 [ 976.127730][ T4561] loop2: partition table partially beyond EOD, truncated [ 976.135013][ T4561] loop2: p1 start 1 is beyond EOD, truncated [ 976.192553][ T4575] loop4: p1 15:51:37 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000000000000000000000000000d000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:37 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) close(r1) 15:51:37 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(0x0) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x8ec0, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000002380)=ANY=[@ANYBLOB='P'], 0x1) read$FUSE(0xffffffffffffffff, &(0x7f0000001340), 0x1000) close(r1) 15:51:37 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000000ffffff80000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:37 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000074000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:37 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000200000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:37 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x8ec0, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000002380)=ANY=[@ANYBLOB='P'], 0x1) read$FUSE(r1, &(0x7f0000001340), 0x1000) close(r0) 15:51:37 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) close(r1) 15:51:37 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x8ec0, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000002380)=ANY=[@ANYBLOB='P'], 0x1) read$FUSE(r1, &(0x7f0000001340), 0x1000) close(r0) 15:51:37 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) close(r1) 15:51:37 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x8ec0, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000002380)=ANY=[@ANYBLOB='P'], 0x1) read$FUSE(r1, &(0x7f0000001340), 0x1000) close(r0) [ 976.615761][ T4599] loop2: p1 [ 976.619107][ T4599] loop2: partition table partially beyond EOD, truncated [ 976.627077][ T4599] loop2: p1 start 1 is beyond EOD, truncated 15:51:37 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)}, 0x0) close(r1) [ 976.805384][ T4594] loop1: p1 p2 [ 976.814860][ T4596] loop5: p1 [ 976.820809][ T4601] loop4: p1 15:51:37 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000000000000000000000000000e000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:37 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x8ec0, 0x0) write$FUSE_DIRENTPLUS(r3, &(0x7f0000002380)=ANY=[@ANYBLOB='P'], 0x1) read$FUSE(r2, &(0x7f0000001340), 0x1000) close(r1) 15:51:37 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000000007a000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:37 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000282000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:37 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000250000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:37 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)}, 0x0) close(r1) 15:51:38 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x8ec0, 0x0) write$FUSE_DIRENTPLUS(r3, &(0x7f0000002380)=ANY=[@ANYBLOB='P'], 0x1) read$FUSE(r2, &(0x7f0000001340), 0x1000) close(r1) 15:51:38 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)}, 0x0) close(r1) 15:51:38 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, 0xffffffffffffffff, 0x0, 0x8ec0, 0x0) write$FUSE_DIRENTPLUS(r3, &(0x7f0000002380)=ANY=[@ANYBLOB='P'], 0x1) read$FUSE(r2, &(0x7f0000001340), 0x1000) close(r1) [ 977.182815][ T4636] loop5: p1 15:51:38 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) close(r1) 15:51:38 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r3, &(0x7f0000002380)=ANY=[@ANYBLOB='P'], 0x1) read$FUSE(r2, &(0x7f0000001340), 0x1000) close(r1) [ 977.302215][ T4640] loop4: p1 15:51:38 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r3, &(0x7f0000002380)=ANY=[@ANYBLOB='P'], 0x1) read$FUSE(r2, &(0x7f0000001340), 0x1000) close(r1) [ 977.398663][ T4637] loop2: p1 [ 977.402130][ T4637] loop2: partition table partially beyond EOD, truncated [ 977.409371][ T4637] loop2: p1 start 1 is beyond EOD, truncated [ 977.415589][ T4641] loop1: p1 p2 15:51:38 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) close(r1) 15:51:38 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000000ffffff8c000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:38 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x0, 0x0) write$FUSE_DIRENTPLUS(r3, &(0x7f0000002380)=ANY=[@ANYBLOB='P'], 0x1) read$FUSE(r2, &(0x7f0000001340), 0x1000) close(r1) 15:51:38 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000011000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:38 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000ffffff80000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:38 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000f7250000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:38 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1}, 0x0) close(r1) 15:51:38 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000002380)=ANY=[@ANYBLOB='P'], 0x1) read$FUSE(r2, &(0x7f0000001340), 0x1000) close(r1) [ 977.787629][ T4683] loop5: p1 15:51:38 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)}], 0x1}, 0x0) close(r1) [ 977.892126][ T4692] print_req_error: 2321 callbacks suppressed [ 977.892138][ T4692] blk_update_request: I/O error, dev loop5, sector 1 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 977.892796][ T4683] __loop_clr_fd: partition scan of loop5 failed (rc=-16) [ 977.898543][ T2515] blk_update_request: I/O error, dev loop5, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 977.927459][ T2515] buffer_io_error: 2318 callbacks suppressed [ 977.927466][ T2515] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 977.941558][ T2515] blk_update_request: I/O error, dev loop5, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 977.952646][ T2515] Buffer I/O error on dev loop5p1, logical block 1, async page read [ 977.952684][ T2515] blk_update_request: I/O error, dev loop5, sector 3 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 977.952697][ T2515] Buffer I/O error on dev loop5p1, logical block 2, async page read [ 977.971538][ T2515] blk_update_request: I/O error, dev loop5, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 977.990344][ T2515] Buffer I/O error on dev loop5p1, logical block 3, async page read [ 977.998384][ T2515] blk_update_request: I/O error, dev loop5, sector 5 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 978.009253][ T2515] Buffer I/O error on dev loop5p1, logical block 4, async page read [ 978.017308][ T2515] blk_update_request: I/O error, dev loop5, sector 6 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 978.028214][ T2515] Buffer I/O error on dev loop5p1, logical block 5, async page read 15:51:38 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000000ffffff97000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 978.036256][ T2515] blk_update_request: I/O error, dev loop5, sector 7 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 978.047132][ T2515] Buffer I/O error on dev loop5p1, logical block 6, async page read [ 978.055188][ T2515] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 978.066103][ T2515] Buffer I/O error on dev loop5p1, logical block 7, async page read [ 978.075081][ T2515] blk_update_request: I/O error, dev loop5, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 978.085977][ T2515] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 978.094062][ T2515] Buffer I/O error on dev loop5p1, logical block 1, async page read [ 978.125739][ T4687] Dev loop2: unable to read RDB block 1 [ 978.131389][ T4687] loop2: unable to read partition table [ 978.137099][ T4687] loop2: partition table beyond EOD, truncated [ 978.143382][ T4687] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 978.204171][ T4688] loop1: p1 p2 15:51:39 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)}], 0x1}, 0x0) close(r1) 15:51:39 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000003f0000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:39 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000ffffff8c000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:39 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000012000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 978.405693][ T4710] loop5: p1 15:51:39 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)}], 0x1}, 0x0) close(r1) 15:51:39 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000000ffffffa1000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:39 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000150081f87059ae08060c040002ff0f02000000000000018701546fabca1b4e7d06a6", 0x26}], 0x1}, 0x0) close(r1) 15:51:39 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000002380)=ANY=[@ANYBLOB='P'], 0x1) read$FUSE(r2, &(0x7f0000001340), 0x1000) close(r1) [ 978.622459][ T4721] loop4: p1 15:51:39 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000150081f87059ae08060c040002ff0f02000000000000018701546fabca1b4e7d06a6", 0x26}], 0x1}, 0x0) close(r1) 15:51:39 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000400000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 978.770337][ T4728] Dev loop2: unable to read RDB block 1 [ 978.776016][ T4728] loop2: unable to read partition table [ 978.781755][ T4728] loop2: partition table beyond EOD, truncated [ 978.787942][ T4728] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 978.798472][ T4730] loop1: p1 p2 [ 978.832768][ T4735] loop5: p1 15:51:39 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000150081f87059ae08060c040002ff0f02000000000000018701546fabca1b4e7d06a6", 0x26}], 0x1}, 0x0) close(r1) 15:51:39 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000020000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:39 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000ffffff97000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:39 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000000000002a2000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:39 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000150081f87059ae08060c040002ff0f02000000000000018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f", 0x39}], 0x1}, 0x0) close(r1) [ 979.107527][ T4754] loop4: p1 15:51:40 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000150081f87059ae08060c040002ff0f02000000000000018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f", 0x39}], 0x1}, 0x0) close(r1) 15:51:40 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000420000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:40 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000150081f87059ae08060c040002ff0f02000000000000018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f", 0x39}], 0x1}, 0x0) close(r1) [ 979.272968][ T4764] loop1: p1 p2 [ 979.299462][ T4767] Dev loop2: unable to read RDB block 1 [ 979.305298][ T4767] loop2: unable to read partition table [ 979.311066][ T4767] loop2: partition table beyond EOD, truncated [ 979.317246][ T4767] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 15:51:40 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000150081f87059ae08060c040002ff0f02000000000000018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb8", 0x43}], 0x1}, 0x0) close(r1) [ 979.522029][ T4774] loop5: p1 15:51:40 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) write$FUSE_DIRENTPLUS(0xffffffffffffffff, &(0x7f0000002380)=ANY=[@ANYBLOB='P'], 0x1) read$FUSE(r2, &(0x7f0000001340), 0x1000) close(r1) 15:51:40 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000000ffffffc9000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:40 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000150081f87059ae08060c040002ff0f02000000000000018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb8", 0x43}], 0x1}, 0x0) close(r1) 15:51:40 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000025000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:40 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000ffffffa1000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 979.702698][ T4794] loop4: p1 15:51:40 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000150081f87059ae08060c040002ff0f02000000000000018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb8", 0x43}], 0x1}, 0x0) close(r1) 15:51:40 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000f430000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:40 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000150081f87059ae08060c040002ff0f02000000000000018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8f", 0x48}], 0x1}, 0x0) close(r1) [ 979.862080][ T4803] Dev loop2: unable to read RDB block 1 [ 979.867838][ T4803] loop2: unable to read partition table [ 979.873622][ T4803] loop2: partition table beyond EOD, truncated [ 979.879872][ T4803] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 979.972617][ T4806] loop1: p1 p2 15:51:40 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000150081f87059ae08060c040002ff0f02000000000000018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8f", 0x48}], 0x1}, 0x0) close(r1) [ 980.008415][ T4801] loop5: p1 15:51:41 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000150081f87059ae08060c040002ff0f02000000000000018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8f", 0x48}], 0x1}, 0x0) close(r1) 15:51:41 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000ffffffc9000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:41 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000150081f87059ae08060c040002ff0f02000000000000018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8ff531", 0x4a}], 0x1}, 0x0) close(r1) 15:51:41 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) write$FUSE_DIRENTPLUS(r3, 0x0, 0x0) read$FUSE(r2, &(0x7f0000001340), 0x1000) close(r1) 15:51:41 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000000000000000000000000003f000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:41 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000000ffffffe4000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:41 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000150081f87059ae08060c040002ff0f02000000000000018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8ff531", 0x4a}], 0x1}, 0x0) close(r1) 15:51:41 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000480000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 980.423109][ T4845] Dev loop2: unable to read RDB block 1 [ 980.428778][ T4845] loop2: unable to read partition table [ 980.434567][ T4845] loop2: partition table beyond EOD, truncated [ 980.440731][ T4845] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 15:51:41 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000ffffffe4000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:41 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000150081f87059ae08060c040002ff0f02000000000000018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8ff531", 0x4a}], 0x1}, 0x0) close(r1) [ 980.627441][ T4859] loop4: p1 15:51:41 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000150081f87059ae08060c040002ff0f02000000000000018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8ff53144", 0x4b}], 0x1}, 0x0) close(r1) [ 980.716932][ T4861] loop1: p1 p2 [ 980.765395][ T4858] loop5: p1 15:51:41 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000004c0000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:41 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000150081f87059ae08060c040002ff0f02000000000000018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8ff53144", 0x4b}], 0x1}, 0x0) close(r1) [ 980.822102][ T4873] Dev loop2: unable to read RDB block 1 [ 980.827822][ T4873] loop2: unable to read partition table [ 980.833607][ T4873] loop2: partition table beyond EOD, truncated [ 980.839777][ T4873] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 15:51:41 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) r1 = socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000150081f87059ae08060c040002ff0f02000000000000018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8ff53144", 0x4b}], 0x1}, 0x0) close(r1) 15:51:41 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000ffffffeb000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 981.066025][ T4885] loop4: p1 [ 981.232766][ T4900] Dev loop2: unable to read RDB block 1 [ 981.238426][ T4900] loop2: unable to read partition table [ 981.244375][ T4900] loop2: partition table beyond EOD, truncated [ 981.250561][ T4900] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 15:51:42 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000040000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:42 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000005c0000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:42 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000150081f87059ae08060c040002ff0f02000000000000018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8ff5314461", 0x4c}], 0x1}, 0x0) close(0xffffffffffffffff) 15:51:42 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000000ffffffeb000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:42 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) write$FUSE_DIRENTPLUS(r3, 0x0, 0x0) read$FUSE(r2, &(0x7f0000001340), 0x1000) close(r1) 15:51:42 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000ffffffee000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:42 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000150081f87059ae08060c040002ff0f02000000000000018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8ff5314461", 0x4c}], 0x1}, 0x0) close(0xffffffffffffffff) [ 981.566468][ T4918] loop1: p1 p2 15:51:42 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x4) socket$kcm(0x2, 0x3, 0x2) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000100)="4c000000150081f87059ae08060c040002ff0f02000000000000018701546fabca1b4e7d06a6bd7c493872f750375ed08a562ad6e74703c48f93b82a02000000461eb886a5e54e8ff5314461", 0x4c}], 0x1}, 0x0) close(0xffffffffffffffff) [ 981.705793][ T4917] loop4: p1 15:51:42 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000000000000000000000000005c000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:42 executing program 3: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000000c0)) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) unshare(0x40000000) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x20}) syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) [ 981.801856][ T4916] loop5: p1 [ 981.815015][ T4924] Dev loop2: unable to read RDB block 1 [ 981.820609][ T4924] loop2: unable to read partition table [ 981.826357][ T4924] loop2: partition table beyond EOD, truncated [ 981.832569][ T4924] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 15:51:42 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000600000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 981.952301][ T4944] IPVS: ftp: loaded support on port[0] = 21 15:51:43 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000fffffff4000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 982.153155][ T4944] IPVS: ftp: loaded support on port[0] = 21 [ 982.184082][ T4946] loop1: p1 p2 15:51:43 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000000ffffffee000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:43 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) write$FUSE_DIRENTPLUS(r3, 0x0, 0x0) read$FUSE(r2, &(0x7f0000001340), 0x1000) close(r1) [ 982.342224][ T4956] loop4: p1 15:51:43 executing program 3: recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, 0x0, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') semctl$SETALL(0x0, 0x0, 0x11, &(0x7f00000000c0)) syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) unshare(0x40000000) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x20}) syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) 15:51:43 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000000000100800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:43 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000680000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 982.564846][ T4980] IPVS: ftp: loaded support on port[0] = 21 [ 982.608432][ T4970] loop5: p1 [ 982.634509][ T4968] Dev loop2: unable to read RDB block 1 [ 982.640187][ T4968] loop2: unable to read partition table [ 982.646026][ T4968] loop2: partition table beyond EOD, truncated [ 982.652284][ T4968] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 15:51:43 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000000fffffff6000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:43 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000fffffff6000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 982.885676][ T4979] loop1: p1 p2 15:51:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) sched_setattr(r0, &(0x7f0000000180)={0x30, 0x0, 0x1, 0x0, 0x7, 0xc9d, 0x7, 0x8}, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000740)='/dev/zero\x00', 0x0, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) r3 = syz_open_dev$midi(0x0, 0x0, 0x40280) ioctl$RTC_PIE_OFF(r2, 0x7006) setsockopt$packet_fanout_data(r3, 0x107, 0x16, 0x0, 0x0) syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x0, 0x4000) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000240)='sit0\x00', 0x10) r4 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0xffffffff, 0x105084) ioctl$TCSETXW(r2, 0x5435, &(0x7f0000000440)={0xffff, 0xdd7, [0x6, 0x87, 0x2, 0xb6a3, 0x6], 0xf1}) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000280), &(0x7f00000002c0)=0x8) r5 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r5, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) sendfile(r1, r4, 0x0, 0x102000002) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000640)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) [ 982.936661][ T4983] loop4: p1 15:51:44 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000006c0000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:44 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000000000200800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 983.102380][ T4996] loop5: p1 15:51:44 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) write$FUSE_DIRENTPLUS(r3, &(0x7f0000002380)=ANY=[], 0x0) read$FUSE(r2, &(0x7f0000001340), 0x1000) close(r1) 15:51:44 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000020ff8000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 983.253753][ T4998] Dev loop2: unable to read RDB block 1 [ 983.259364][ T4998] loop2: unable to read partition table [ 983.265126][ T4998] loop2: partition table beyond EOD, truncated [ 983.271380][ T4998] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 983.419976][ T5011] loop4: p1 15:51:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) sched_setattr(r0, &(0x7f0000000180)={0x30, 0x0, 0x1, 0x0, 0x7, 0xc9d, 0x7, 0x8}, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000740)='/dev/zero\x00', 0x0, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) r3 = syz_open_dev$midi(0x0, 0x0, 0x40280) ioctl$RTC_PIE_OFF(r2, 0x7006) setsockopt$packet_fanout_data(r3, 0x107, 0x16, 0x0, 0x0) syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x0, 0x4000) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000240)='sit0\x00', 0x10) r4 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0xffffffff, 0x105084) ioctl$TCSETXW(r2, 0x5435, &(0x7f0000000440)={0xffff, 0xdd7, [0x6, 0x87, 0x2, 0xb6a3, 0x6], 0xf1}) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000280), &(0x7f00000002c0)=0x8) r5 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r5, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) sendfile(r1, r4, 0x0, 0x102000002) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000640)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) [ 983.574749][ T5014] loop1: p1 p2 15:51:44 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000fffffffb000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 983.745313][ T5022] loop5: p1 15:51:44 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000000000300800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:44 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000740000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:44 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000000fffffdfd000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 984.077751][ T5042] Dev loop2: unable to read RDB block 1 [ 984.083592][ T5042] loop2: unable to read partition table [ 984.089294][ T5042] loop2: partition table beyond EOD, truncated [ 984.095550][ T5042] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 984.166564][ T5046] loop1: p1 p2 15:51:45 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) write$FUSE_DIRENTPLUS(r3, &(0x7f0000002380)=ANY=[], 0x0) read$FUSE(r2, &(0x7f0000001340), 0x1000) close(r1) [ 984.188047][ T5046] loop1: p2 size 196608 extends beyond EOD, truncated [ 984.292181][ T5047] loop4: p1 15:51:45 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000025fd000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:45 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000000fffffffd000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:45 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000000000400800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:45 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000007a0000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) sched_setattr(r0, &(0x7f0000000180)={0x30, 0x0, 0x1, 0x0, 0x7, 0xc9d, 0x7, 0x8}, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000740)='/dev/zero\x00', 0x0, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) r3 = syz_open_dev$midi(0x0, 0x0, 0x40280) ioctl$RTC_PIE_OFF(r2, 0x7006) setsockopt$packet_fanout_data(r3, 0x107, 0x16, 0x0, 0x0) syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x0, 0x4000) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000240)='sit0\x00', 0x10) r4 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0xffffffff, 0x105084) ioctl$TCSETXW(r2, 0x5435, &(0x7f0000000440)={0xffff, 0xdd7, [0x6, 0x87, 0x2, 0xb6a3, 0x6], 0xf1}) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000280), &(0x7f00000002c0)=0x8) r5 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r5, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) sendfile(r1, r4, 0x0, 0x102000002) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000640)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) [ 984.686494][ T5072] loop2: p1 [ 984.689831][ T5072] loop2: partition table partially beyond EOD, truncated [ 984.697224][ T5072] loop2: p1 start 1 is beyond EOD, truncated [ 984.832305][ T5076] loop1: p1 p2 [ 984.838117][ T5076] loop1: p2 size 262144 extends beyond EOD, truncated [ 984.874483][ T5074] loop5: p1 15:51:45 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000000000500800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 984.928329][ T5082] loop4: p1 15:51:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) sched_setattr(r0, &(0x7f0000000180)={0x30, 0x0, 0x1, 0x0, 0x7, 0xc9d, 0x7, 0x8}, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000740)='/dev/zero\x00', 0x0, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) r3 = syz_open_dev$midi(0x0, 0x0, 0x40280) ioctl$RTC_PIE_OFF(r2, 0x7006) setsockopt$packet_fanout_data(r3, 0x107, 0x16, 0x0, 0x0) syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x0, 0x4000) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000240)='sit0\x00', 0x10) r4 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0xffffffff, 0x105084) ioctl$TCSETXW(r2, 0x5435, &(0x7f0000000440)={0xffff, 0xdd7, [0x6, 0x87, 0x2, 0xb6a3, 0x6], 0xf1}) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000280), &(0x7f00000002c0)=0x8) r5 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r5, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) sendfile(r1, r4, 0x0, 0x102000002) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000640)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) 15:51:45 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000fffffdfd000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:46 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000000fffffffe000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:46 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) write$FUSE_DIRENTPLUS(r3, &(0x7f0000002380)=ANY=[], 0x0) read$FUSE(r2, &(0x7f0000001340), 0x1000) close(r1) 15:51:46 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000900000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 985.368578][ T5108] Dev loop2: unable to read RDB block 1 [ 985.374385][ T5108] loop2: unable to read partition table [ 985.380073][ T5108] loop2: partition table beyond EOD, truncated [ 985.386684][ T5108] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 985.421939][ T5102] loop1: p1 p2 15:51:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) sched_setattr(r0, &(0x7f0000000180)={0x30, 0x0, 0x1, 0x0, 0x7, 0xc9d, 0x7, 0x8}, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000740)='/dev/zero\x00', 0x0, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) r3 = syz_open_dev$midi(0x0, 0x0, 0x40280) ioctl$RTC_PIE_OFF(r2, 0x7006) setsockopt$packet_fanout_data(r3, 0x107, 0x16, 0x0, 0x0) syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x0, 0x4000) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000240)='sit0\x00', 0x10) r4 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0xffffffff, 0x105084) ioctl$TCSETXW(r2, 0x5435, &(0x7f0000000440)={0xffff, 0xdd7, [0x6, 0x87, 0x2, 0xb6a3, 0x6], 0xf1}) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r3, 0x84, 0x71, &(0x7f0000000280), &(0x7f00000002c0)=0x8) r5 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) pwritev(r5, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a8", 0x1}], 0x1, 0x81003) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) sendfile(r1, r4, 0x0, 0x102000002) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000640)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) fsetxattr$trusted_overlay_redirect(r3, &(0x7f0000000680)='trusted.overlay.redirect\x00', &(0x7f00000006c0)='./file0\x00', 0x8, 0x3) [ 985.446983][ T5102] loop1: p2 size 327680 extends beyond EOD, truncated 15:51:46 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000fff000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:46 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000000000600800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 985.585942][ T5120] loop4: p1 15:51:46 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000fffffffd000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:46 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000002a80000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:46 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000020fff000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:46 executing program 3: [ 985.938661][ T5140] Dev loop2: unable to read RDB block 1 [ 985.944544][ T5140] loop2: unable to read partition table [ 985.950779][ T5140] loop2: partition table beyond EOD, truncated [ 985.957008][ T5140] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 15:51:46 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) write$FUSE_DIRENTPLUS(r3, &(0x7f0000002380)=ANY=[@ANYBLOB], 0x0) read$FUSE(r2, &(0x7f0000001340), 0x1000) close(r1) 15:51:47 executing program 3: [ 986.067993][ T5144] loop1: p1 p2 [ 986.087660][ T5144] loop1: p2 size 393216 extends beyond EOD, truncated 15:51:47 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000fffffffe000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:47 executing program 3: [ 986.215746][ T5151] loop5: p1 15:51:47 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000000ffffefff000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:47 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000000000700800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:47 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000002aa0000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:47 executing program 3: 15:51:47 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ppp\x00', 0x0, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000002c0)=""/246) r1 = dup(r0) ioctl$TIOCLINUX3(r1, 0x4004743c, 0x0) read$eventfd(r1, 0x0, 0x0) [ 986.508428][ T5175] Dev loop2: unable to read RDB block 1 [ 986.514170][ T5175] loop2: unable to read partition table [ 986.519863][ T5175] loop2: partition table beyond EOD, truncated [ 986.526090][ T5175] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 986.602094][ T5177] loop5: p1 [ 986.649195][ T5193] syz-executor.3 (5193) used obsolete PPPIOCDETACH ioctl 15:51:47 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000fff000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:47 executing program 3: sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYPTR64=&(0x7f00000000c0)=ANY=[@ANYRESDEC]], 0x8}}, 0x0) syz_read_part_table(0x0, 0xaaaaaaaaaaaac04, &(0x7f0000000080)=[{&(0x7f0000000000)="02000f00000097030000ff07000000000000000000000000000000000000000000004200000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:47 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000000000fffff000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 986.756514][ T5185] loop1: p1 p2 [ 986.775554][ T5185] loop1: p2 size 458752 extends beyond EOD, truncated 15:51:47 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) write$FUSE_DIRENTPLUS(r3, &(0x7f0000002380)=ANY=[@ANYBLOB], 0x0) read$FUSE(r2, &(0x7f0000001340), 0x1000) close(r1) 15:51:47 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000025f70000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:47 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000000000800800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 987.091902][ T5206] ldm_parse_privhead(): Cannot find PRIVHEAD structure. LDM database is corrupt. Aborting. [ 987.102066][ T5206] ldm_validate_privheads(): Cannot find PRIVHEAD 1. [ 987.148325][ T5206] loop3: p1 < > [ 987.234427][ T5216] loop1: p1 p2 [ 987.239504][ T5205] loop5: p1 [ 987.255178][ T5216] loop1: p2 size 524288 extends beyond EOD, truncated [ 987.359574][ T5201] loop2: p1 [ 987.362863][ T5201] loop2: partition table partially beyond EOD, truncated [ 987.370081][ T5201] loop2: p1 start 1 is beyond EOD, truncated 15:51:48 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000700)={@ipv4={[], [], @multicast2}}, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x3, 0x0) socket$inet6(0xa, 0x0, 0x0) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f00000000c0), 0xfffffffffffffc21) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x12080, 0x0) clone(0x3fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x4) clone(0x0, 0x0, 0x0, 0x0, 0x0) 15:51:48 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000fff0000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:48 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000000007fffffff000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:48 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000000ffff000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:48 executing program 3: writev(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000000c0)='0', 0x1}], 0x1) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp6\x00') preadv(r0, &(0x7f00000017c0), 0x1be, 0x0) 15:51:48 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000f80f0200000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 987.808783][ T5245] loop5: p1 15:51:48 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) write$FUSE_DIRENTPLUS(r3, &(0x7f0000002380)=ANY=[@ANYBLOB], 0x0) read$FUSE(r2, &(0x7f0000001340), 0x1000) close(r1) [ 987.862512][ T5251] loop2: p1 [ 987.865817][ T5251] loop2: partition table partially beyond EOD, truncated [ 987.873187][ T5251] loop2: p1 start 1 is beyond EOD, truncated 15:51:48 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000000000900800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 988.039441][ T5245] __loop_clr_fd: partition scan of loop5 failed (rc=-16) [ 988.039901][ T5272] print_req_error: 767 callbacks suppressed [ 988.039913][ T5272] blk_update_request: I/O error, dev loop5, sector 1 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 988.068317][ T2515] blk_update_request: I/O error, dev loop5, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 988.079349][ T2515] buffer_io_error: 766 callbacks suppressed [ 988.079360][ T2515] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 988.093341][ T2515] blk_update_request: I/O error, dev loop5, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 988.104276][ T2515] Buffer I/O error on dev loop5p1, logical block 1, async page read [ 988.112326][ T2515] blk_update_request: I/O error, dev loop5, sector 3 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 988.123295][ T2515] Buffer I/O error on dev loop5p1, logical block 2, async page read 15:51:49 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x8ec0, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000002380)=ANY=[@ANYBLOB='P'], 0x1) read$FUSE(0xffffffffffffffff, &(0x7f0000001340), 0x1000) close(r1) 15:51:49 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000000000ffffffff000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 988.131351][ T2515] blk_update_request: I/O error, dev loop5, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 988.142279][ T2515] Buffer I/O error on dev loop5p1, logical block 3, async page read [ 988.150284][ T2515] blk_update_request: I/O error, dev loop5, sector 5 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 988.161218][ T2515] Buffer I/O error on dev loop5p1, logical block 4, async page read [ 988.169222][ T2515] blk_update_request: I/O error, dev loop5, sector 6 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 988.180233][ T2515] Buffer I/O error on dev loop5p1, logical block 5, async page read 15:51:49 executing program 3: writev(0xffffffffffffffff, &(0x7f00000023c0)=[{&(0x7f00000000c0)='0', 0x1}], 0x1) sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/tcp6\x00') preadv(r0, &(0x7f00000017c0), 0x1be, 0x0) [ 988.188264][ T2515] blk_update_request: I/O error, dev loop5, sector 7 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 988.199151][ T2515] Buffer I/O error on dev loop5p1, logical block 6, async page read [ 988.207202][ T2515] blk_update_request: I/O error, dev loop5, sector 8 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 988.218113][ T2515] Buffer I/O error on dev loop5p1, logical block 7, async page read [ 988.227110][ T2515] blk_update_request: I/O error, dev loop5, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 988.238045][ T2515] Buffer I/O error on dev loop5p1, logical block 0, async page read [ 988.246087][ T2515] Buffer I/O error on dev loop5p1, logical block 1, async page read 15:51:49 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x8ec0, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000002380)=ANY=[@ANYBLOB='P'], 0x1) read$FUSE(0xffffffffffffffff, &(0x7f0000001340), 0x1000) close(r1) 15:51:49 executing program 3: r0 = socket$inet(0x2, 0x80003, 0x8) sendmmsg(0xffffffffffffffff, &(0x7f0000003480)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="34000089"], 0x4}}], 0x1, 0x0) sendmmsg(r0, &(0x7f00000038c0)=[{{&(0x7f0000000040)=@nl=@unspec, 0x80, &(0x7f0000000100), 0x0, &(0x7f0000000380)}}, {{&(0x7f0000000400)=@in={0x2, 0x0, @local}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000480), 0x1400}}], 0x2, 0x0) 15:51:49 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000fdfdffff000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 988.461769][ T5274] loop1: p1 p2 [ 988.469470][ T5274] loop1: p2 size 589824 extends beyond EOD, truncated 15:51:49 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000ff0f0200000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:49 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x8ec0, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000002380)=ANY=[@ANYBLOB='P'], 0x1) read$FUSE(0xffffffffffffffff, &(0x7f0000001340), 0x1000) close(r1) [ 988.578359][ T5286] loop5: p1 15:51:49 executing program 3: creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) r0 = gettid() sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000021c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="2cca0f34"], 0x4}}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001a40)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f0000000340)="3a8853", 0x3}], 0x3}}], 0x1, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x38) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 15:51:49 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000000000a00800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:49 executing program 3: prctl$PR_GET_SECUREBITS(0x1b) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_INFO_BUFS(r0, 0xc0106418, &(0x7f0000000080)={0x8, 0x2, 0x2, 0x8, 0x10, 0x100000001}) ioctl$DRM_IOCTL_MODE_GETCRTC(0xffffffffffffffff, 0xc06864a1, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, &(0x7f0000000740)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=""/126, 0xb2}) writev(r1, &(0x7f0000000080), 0x5b) 15:51:49 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700ffffffffffffffff000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 988.701508][ T5298] Dev loop2: unable to read RDB block 1 [ 988.707201][ T5298] loop2: unable to read partition table [ 988.712925][ T5298] loop2: partition table beyond EOD, truncated [ 988.719076][ T5298] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 15:51:49 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) write$FUSE_DIRENTPLUS(r3, &(0x7f0000002380)=ANY=[@ANYBLOB='P'], 0x1) read$FUSE(r2, 0x0, 0x0) close(r1) 15:51:49 executing program 3: prctl$PR_GET_SECUREBITS(0x1b) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_INFO_BUFS(r0, 0xc0106418, &(0x7f0000000080)={0x8, 0x2, 0x2, 0x8, 0x10, 0x100000001}) ioctl$DRM_IOCTL_MODE_GETCRTC(0xffffffffffffffff, 0xc06864a1, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x10006, 0x80011, r0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='comm\x00') getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, 0x0, &(0x7f0000000740)) ptrace$getregset(0x4204, 0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000002c0)=""/126, 0xb2}) writev(r1, &(0x7f0000000080), 0x5b) [ 988.947249][ T5315] loop1: p1 p2 [ 988.956418][ T5315] loop1: p2 size 655360 extends beyond EOD, truncated 15:51:49 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700007fffffff000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:49 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000100200000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:49 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) write$FUSE_DIRENTPLUS(r3, &(0x7f0000002380)=ANY=[@ANYBLOB='P'], 0x1) read$FUSE(r2, 0x0, 0x0) close(r1) 15:51:50 executing program 3: socketpair$unix(0x1, 0x200000000000003, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x200408d4, &(0x7f0000000380)={0xa, 0x0, 0x0, @loopback}, 0x1c) 15:51:50 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000002000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:50 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000000000b00800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:50 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r3, 0x0, 0x8ec0, 0x0) write$FUSE_DIRENTPLUS(r3, &(0x7f0000002380)=ANY=[@ANYBLOB='P'], 0x1) read$FUSE(r2, 0x0, 0x0) close(r1) 15:51:50 executing program 3: r0 = creat(&(0x7f0000000080)='./file0\x00', 0x43b) close(r0) execve(&(0x7f0000000000)='./file0\x00', &(0x7f00000003c0)=[&(0x7f0000001b00)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\x8aO\x9d\x94\x8d\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x01\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\xfd\x05\xee\xa0L\xe4C\"\xba\xd5\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xcc\a\x10dxb\xc2\x13m[P\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb5\\\xf5\x05\xec\xa3\x98\f1\x89\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0Xk\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\x9f\xa1\xda@\xc7-\x93\xbc4\xc0\xfe\xf6\xf6\xc4\xc3ZT>R\x11\xba\xf9\x17\r\x98\a\x06\xe8\x80\xef\xdf\x87\x1f\xfd\xb8\x99\x9c\x19\xb4\xac'], 0x0) [ 989.373568][ T5354] loop4: p1 15:51:50 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x8ec0, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000002380)=ANY=[@ANYBLOB='P'], 0x1) read$FUSE(r1, &(0x7f0000001340), 0x1000) close(0xffffffffffffffff) [ 989.446929][ T5351] Dev loop2: unable to read RDB block 1 [ 989.452643][ T5351] loop2: unable to read partition table [ 989.458357][ T5351] loop2: partition table beyond EOD, truncated [ 989.464853][ T5351] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 15:51:50 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) fcntl$setownex(r0, 0xf, &(0x7f0000000180)={0x3}) 15:51:50 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000003000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:50 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000800000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 989.633294][ T5368] loop1: p1 p2 [ 989.648357][ T5368] loop1: p2 size 720896 extends beyond EOD, truncated 15:51:50 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000080ffffff000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:50 executing program 3: r0 = syz_open_dev$video(&(0x7f0000000180)='/dev/video#\x00', 0x0, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05604, &(0x7f00000001c0)={0xb, @pix_mp}) 15:51:50 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000000000c00800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:50 executing program 3: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x80001) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) writev(r0, &(0x7f00000000c0)=[{0x0}, {&(0x7f00000003c0)="71b0ba378d81448379f726000be4e6194bb337dfa2a9e5725237cc46954c1610d6eb2e01c00d2eea082dbe2669fd103c5d454f169a3857687f45c1c2924921c21343351c3fdf4c3e3247a2ed36903d6f25ca2a405202d7a39b6b1374d502352c41daa02139984db84605d668c04cb9083ce0ce15f836f180d7c6b12cca", 0x7d}], 0x2) [ 989.951138][ T5403] loop4: p1 [ 989.992913][ T5406] loop2: p1 [ 989.996208][ T5406] loop2: partition table partially beyond EOD, truncated [ 990.003621][ T5406] loop2: p1 start 1 is beyond EOD, truncated 15:51:51 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000ffff0f00000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:51 executing program 3: r0 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000200)) write$P9_ROPEN(r0, &(0x7f00000000c0)={0x18}, 0xff9c) fallocate(r0, 0x3, 0x0, 0x8001) 15:51:51 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700008cffffff000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 990.221629][ T5418] loop1: p1 p2 [ 990.226351][ T5418] loop1: p2 size 786432 extends beyond EOD, truncated 15:51:51 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000004000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:51 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x8ec0, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000002380)=ANY=[@ANYBLOB='P'], 0x1) read$FUSE(r1, &(0x7f0000001340), 0x1000) close(0xffffffffffffffff) 15:51:51 executing program 3: r0 = creat(&(0x7f0000000000)='./file1\x00', 0x0) fallocate(r0, 0x0, 0xc478, 0x5) fallocate(r0, 0x0, 0x0, 0x4005ef0) write$P9_ROPEN(r0, &(0x7f00000000c0)={0x18}, 0x18) fallocate(r0, 0x3, 0x0, 0x8001) 15:51:51 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000000000d00800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:51 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000021000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:51 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)={[{@resize='resize'}, {@iocharset={'iocharset', 0x3d, 'iso8859-7'}}, {@integrity='integrity'}], [{@permit_directio='permit_directio'}]}) [ 990.583626][ T5435] Dev loop2: unable to read RDB block 1 [ 990.589307][ T5435] loop2: unable to read partition table [ 990.595074][ T5435] loop2: partition table beyond EOD, truncated [ 990.601266][ T5435] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 990.775937][ T5452] loop1: p1 p2 [ 990.780750][ T5452] loop1: p2 size 851968 extends beyond EOD, truncated 15:51:51 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000097ffffff000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 990.864055][ T5464] loop4: p1 15:51:51 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000005000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:51 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000000000e00800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 990.884398][ T5468] JFS: Cannot determine volume size [ 990.889806][ T5468] jfs: Unrecognized mount option "permit_directio" or missing value 15:51:52 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000002000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 991.051526][ T5468] JFS: Cannot determine volume size [ 991.056771][ T5468] jfs: Unrecognized mount option "permit_directio" or missing value [ 991.091595][ T5475] Dev loop2: unable to read RDB block 1 [ 991.097231][ T5475] loop2: unable to read partition table [ 991.102974][ T5475] loop2: partition table beyond EOD, truncated [ 991.109158][ T5475] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 15:51:52 executing program 3: io_setup(0x4, &(0x7f0000000080)=0x0) r1 = socket(0x2, 0x803, 0xff) memfd_create(&(0x7f00000000c0), 0x0) io_submit(r0, 0x1, &(0x7f0000000040)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000140), 0x8a}]) 15:51:52 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000006000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 991.380613][ T5484] loop1: p1 p2 [ 991.391013][ T5484] loop1: p2 size 917504 extends beyond EOD, truncated [ 991.413455][ T5490] loop4: p1 15:51:52 executing program 0: socketpair$unix(0x1, 0x100000000001, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r0, 0x0, r2, 0x0, 0x8ec0, 0x0) write$FUSE_DIRENTPLUS(r2, &(0x7f0000002380)=ANY=[@ANYBLOB='P'], 0x1) read$FUSE(r1, &(0x7f0000001340), 0x1000) close(0xffffffffffffffff) 15:51:52 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000a1ffffff000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:52 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000004200000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:52 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000000001000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:52 executing program 3: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000180)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53efb841a7ed54dd62abdbb9df3f8cb7f7e8ced8c1d7e956218947f12f34eeaaa860dabfe91dbc1a998702", 0x63, 0x400}], 0x0, 0x0) [ 991.661823][ T5513] EXT4-fs (loop3): Encoding requested by superblock is unknown 15:51:52 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000007000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:52 executing program 3: creat(&(0x7f0000001880)='./file0\x00', 0x0) chown(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) [ 991.878511][ T5517] Dev loop2: unable to read RDB block 1 [ 991.884188][ T5517] loop2: unable to read partition table [ 991.889870][ T5517] loop2: partition table beyond EOD, truncated [ 991.896112][ T5517] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 991.934953][ T5524] loop4: p1 [ 991.939571][ T5520] loop1: p1 p2 [ 991.965100][ T5520] loop1: p2 size 1048576 extends beyond EOD, truncated 15:51:52 executing program 3: r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) r1 = add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f00000002c0)={'syz'}, 0x0, 0x0, r0) r2 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x103, r1) keyctl$read(0xb, r2, &(0x7f0000005340)=""/4096, 0x102) 15:51:53 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000009000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:53 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) ppoll(&(0x7f0000000140)=[{r1}], 0x1, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x0, 0x0) 15:51:53 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000008000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:53 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000c9ffffff000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:53 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000000001100800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'ctr(cast5)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="ab553fec94", 0x5) r1 = accept$alg(r0, 0x0, 0x0) write$binfmt_script(r1, &(0x7f00000001c0)=ANY=[@ANYRES32], 0xfffffcaf) recvmmsg(r1, &(0x7f00000031c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)=""/87, 0x57}, {&(0x7f0000000300)=""/154, 0x9a}], 0x2}}], 0x5700, 0x0, 0x0) 15:51:53 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1) [ 992.509507][ T5550] Dev loop2: unable to read RDB block 1 [ 992.515414][ T5550] loop2: unable to read partition table [ 992.521169][ T5550] loop2: partition table beyond EOD, truncated [ 992.527358][ T5550] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 15:51:53 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x1fff) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0xa, 0x0, @local}}, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x9c) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 15:51:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x2, 0xa, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, [@sadb_x_filter={0x5, 0x1a, @in=@initdev, @in=@dev, 0x2}]}, 0x38}}, 0x0) [ 992.711752][ T5552] loop4: p1 15:51:53 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000009000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 992.841353][ T5564] loop1: p1 p2 [ 992.851540][ T5564] loop1: p2 size 1114112 extends beyond EOD, truncated 15:51:53 executing program 0: 15:51:53 executing program 0: 15:51:54 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000001000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:54 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x1fff) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0xa, 0x0, @local}}, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x9c) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 15:51:54 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000e4ffffff000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:54 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000000001200800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:54 executing program 0: 15:51:54 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000a000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:54 executing program 0: [ 993.392871][ T5607] loop4: p1 15:51:54 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x1fff) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0xa, 0x0, @local}}, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x9c) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 15:51:54 executing program 0: [ 993.456477][ T5612] Dev loop2: unable to read RDB block 1 [ 993.462382][ T5612] loop2: unable to read partition table [ 993.468069][ T5612] loop2: partition table beyond EOD, truncated [ 993.474310][ T5612] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 15:51:54 executing program 0: 15:51:54 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000ebffffff000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 993.681966][ T5615] loop1: p1 p2 [ 993.691867][ T5615] loop1: p2 size 1179648 extends beyond EOD, truncated 15:51:54 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x2fa, 0x0) 15:51:54 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000002000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:54 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x1fff) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0xa, 0x0, @local}}, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x9c) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") 15:51:54 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000b000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:54 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000000002000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:54 executing program 0: mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) socket$inet(0x10, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000340)=0xa000000000000005) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0xefbd) gettid() r1 = getpgrp(0x0) setpriority(0x0, r1, 0x8001) r2 = open(&(0x7f0000000180)='./file0\x00', 0x40, 0x1) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000080)=[0xffffffffffffffff, 0xffffffffffffffff, r0], 0x3) execve(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) getuid() [ 994.057440][ T5639] Dev loop2: unable to read RDB block 1 [ 994.063228][ T5639] loop2: unable to read partition table [ 994.068932][ T5639] loop2: partition table beyond EOD, truncated [ 994.075153][ T5639] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 15:51:55 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x1fff) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0xa, 0x0, @local}}, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x9c) socket$inet_udplite(0x2, 0x2, 0x88) [ 994.132411][ T5644] loop4: p1 15:51:55 executing program 0: close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/135, 0x74f) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x6, &(0x7f0000002680)=""/190, &(0x7f0000002640)=0xfffffffffffffc63) syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x105082) 15:51:55 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000eeffffff000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:55 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000402000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:55 executing program 0: close(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='/\x00~WM\x00\x030\x80\x90\"\xcf\xde&U]\xc9\xec\xfe\x19t@n\xda\xd3\x83dx-c\xb6a(T\xb9\xe4\x9d\xbd\xca\xefq\x81\x97\xe3~\x87\n0\x8b\x1e:y\x8f\xa7\x88\xa4m0%\xef\x93>Q\x82\x8a\xb6u\x06N*\xdb\xe9\x12d#\xb4\xa7=h\xfb\xe9\x9cm\xb2\xf1`\xd4\x9c\xb6\xcc\xe7l\'(\x9aO\x9d\tsT\xaa\xa5\x86\r#\x83\xdf\x87Rk\xaa\x18M\x90\xbbw)6l\x17\xbc3\xd7e\xe9\xbc/\x88*\x13\xf3\xa9\xc1\xf6\x06`\xbdO\xd2\xfa1\xd2\xc0\xa7u$\"\x89\xbc\xe0b\xd1\r$\xde\xd5@i\x18\xa6k,u\xc4?\xe1\xffE\x8a\xe5\xcd\x9f\xecc\x03\x9b\xa5\xa7\xb6j`\xed\xe5\xcc\xda\xbc~\xe7v`\xef#X\xcc\xdf\xf0\"&\x02\x13\x84\xb0\xc25\xf1\x14\xed\x9a\xde\x92vz\xec\xc2V\xac\xde\xb6\x10\xdfB\xe7\x16\x9f$\x03W\xf75\xae_\xe2\x90\x17\xe5\x1e\'%/H\xb9[\xfb\xbb:\x86U5)\x8b\xdc6\xd7\x1d\xb65\xf4\x1cWw\x1d\xb7z\xea\xff\x88?\xeb=\xc3\xcc$\xbd<\x03n9j\xd3\xaf7\x94PX\x83\x9e\x81\"p\xbc@\x90\x1f\xa6T\xe7\xcc2\x92\xa8/\xc8\f7M\xc0qB\xa1\xc2\xe9\xd3\xe2R\x8eO\xda\xc3+\xca\xef\xe9\x10\xeb\xd3\xb9H\xa3\xbf\xeb\xef_\xa8\xd8$s\xc7\xfb\xf3\xec', 0x0, 0x0) getdents(r0, &(0x7f0000000280)=""/135, 0x74f) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x6, &(0x7f0000002680)=""/190, &(0x7f0000002640)=0xfffffffffffffc63) syz_open_dev$loop(&(0x7f0000ca9ff5)='/dev/loop#\x00', 0x0, 0x105082) 15:51:55 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x1fff) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0xa, 0x0, @local}}, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x9c) 15:51:55 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000c000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 994.386402][ T5652] loop1: p1 p2 [ 994.405286][ T5652] loop1: p2 size 2097152 extends beyond EOD, truncated 15:51:55 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0xffffffffffffffff, 0x2) ioctl$VIDIOC_G_EDID(r0, 0xc0285628, &(0x7f0000000100)={0x0, 0x0, 0x0, [], 0x0}) 15:51:55 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000000002500800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:55 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000006c40)={0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000200)=ANY=[@ANYRES64], 0x8) 15:51:55 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x1fff) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0xa, 0x0, @local}}, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x9c) [ 994.684059][ T5683] Dev loop2: unable to read RDB block 1 [ 994.689772][ T5683] loop2: unable to read partition table [ 994.695525][ T5683] loop2: partition table beyond EOD, truncated [ 994.701725][ T5683] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 15:51:55 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000040)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x1000000004e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) [ 994.795626][ T5687] loop4: p1 15:51:55 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x1fff) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0xa, 0x0, @local}}, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x9c) 15:51:55 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000003000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:55 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000f4ffffff000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:55 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000d000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 995.017277][ T5705] loop1: p1 p2 [ 995.026108][ T5705] loop1: p2 size 2424832 extends beyond EOD, truncated 15:51:56 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x1fff) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0xa, 0x0, @local}}, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x9c) 15:51:56 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000000003f00800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:56 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) syz_open_dev$usbmon(&(0x7f0000000180)='/dev/usbmon#\x00', 0x0, 0x0) pipe(&(0x7f0000000440)) write(0xffffffffffffffff, &(0x7f0000000340), 0x41395527) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r0+30000000}, 0x0) 15:51:56 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x1fff) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0xa, 0x0, @local}}, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x9c) [ 995.201278][ T5718] Dev loop2: unable to read RDB block 1 [ 995.206979][ T5718] loop2: unable to read partition table [ 995.212740][ T5718] loop2: partition table beyond EOD, truncated [ 995.218937][ T5718] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 15:51:56 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x1fff) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0xa, 0x0, @local}}, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x9c) 15:51:56 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff0700000e000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 995.460657][ T5724] loop4: p1 15:51:56 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000f6ffffff000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 995.495495][ T5746] loop1: p1 p2 [ 995.500054][ T5746] loop1: p2 size 4128768 extends beyond EOD, truncated 15:51:56 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(r0, 0x1fff) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0xa, 0x0, @local}}, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x9c) 15:51:56 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000004000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:56 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000000004000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:56 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0xa, 0x0, @local}}, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x9c) 15:51:56 executing program 0: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mount$bpf(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bpf(0x20000000, &(0x7f0000000180)='./file0/file0\x00', 0x0, 0x2001002, 0x0) mount$bpf(0x0, &(0x7f00000003c0)='./file0/file0\x00', 0x0, 0x80000, 0x0) mount$bpf(0x20000000, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x5004, 0x0) mount$bpf(0x0, &(0x7f00000005c0)='./file0/file0\x00', &(0x7f0000000a40)='bpf\x00', 0x0, 0x0) 15:51:56 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000010000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:51:56 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0xa, 0x0, @local}}, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x9c) 15:51:56 executing program 0: clock_gettime(0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)=0x0) r3 = memfd_create(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0) r4 = memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) ioctl$TCGETS2(0xffffffffffffffff, 0x802c542a, &(0x7f00000007c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) r5 = syz_open_dev$sndseq(&(0x7f00000003c0)='/dev/snd/seq\x00', 0x0, 0x1) sched_getaffinity(r2, 0x0, 0x0) mmap$perf(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4, 0x8013, r0, 0x0) r6 = dup2(r5, r4) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r6, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000640)) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000600)={0xee2}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x0, 0x0, 'queue0\x00'}) write$sndseq(r4, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) fstatfs(r3, &(0x7f0000005200)=""/4096) ioctl$VHOST_VSOCK_SET_GUEST_CID(r6, 0x4008af60, &(0x7f0000000780)={@hyper}) [ 995.886913][ T5763] loop4: p1 15:51:56 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000005000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 995.931118][ T5759] Dev loop2: unable to read RDB block 1 [ 995.936719][ T5759] loop2: unable to read partition table [ 995.942548][ T5759] loop2: partition table beyond EOD, truncated [ 995.946027][ T5769] loop1: p1 p2 [ 995.948716][ T5759] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 15:51:56 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0xa, 0x0, @local}}, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x9c) [ 996.041342][ T5769] loop1: p2 size 4194304 extends beyond EOD, truncated 15:51:57 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000011000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:52:05 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000fbffffff000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:52:05 executing program 0: clock_gettime(0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)=0x0) r3 = memfd_create(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0) r4 = memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) ioctl$TCGETS2(0xffffffffffffffff, 0x802c542a, &(0x7f00000007c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) r5 = syz_open_dev$sndseq(&(0x7f00000003c0)='/dev/snd/seq\x00', 0x0, 0x1) sched_getaffinity(r2, 0x0, 0x0) mmap$perf(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4, 0x8013, r0, 0x0) r6 = dup2(r5, r4) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r6, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000640)) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000600)={0xee2}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x0, 0x0, 'queue0\x00'}) write$sndseq(r4, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) fstatfs(r3, &(0x7f0000005200)=""/4096) ioctl$VHOST_VSOCK_SET_GUEST_CID(r6, 0x4008af60, &(0x7f0000000780)={@hyper}) 15:52:05 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000006000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:52:05 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000000005c00800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:52:05 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r0, 0x1fff) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0xa, 0x0, @local}}, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x9c) 15:52:05 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r0, 0x1fff) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0xa, 0x0, @local}}, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x9c) [ 1004.996346][ T5816] Dev loop2: unable to read RDB block 1 [ 1005.002154][ T5816] loop2: unable to read partition table [ 1005.007832][ T5816] loop2: partition table beyond EOD, truncated [ 1005.014038][ T5816] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) 15:52:06 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) listen(r0, 0x1fff) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0xa, 0x0, @local}}, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x9c) 15:52:06 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000fdffffff000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 1110.045938][ T5818] loop4: p1 15:53:51 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000feffffff000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:53:51 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000406000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:53:51 executing program 3: bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(0xffffffffffffffff, 0x1fff) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0xa, 0x0, @local}}, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x9c) 15:53:51 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000012000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:53:51 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000002000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 1111.462073][ T7] device bridge_slave_1 left promiscuous mode [ 1111.468732][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1111.535410][ T7] device bridge_slave_0 left promiscuous mode [ 1111.542098][ T7] bridge0: port 1(bridge_slave_0) entered disabled state 15:53:52 executing program 0: clock_gettime(0x0, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r1 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80800) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000180)=0x0) r3 = memfd_create(&(0x7f00000004c0)='/dev/snd/seq\x00', 0x0) r4 = memfd_create(&(0x7f0000000140)='lotrusted\x1a\x00', 0x0) ioctl$TCGETS2(0xffffffffffffffff, 0x802c542a, &(0x7f00000007c0)) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x0, 0x0) r5 = syz_open_dev$sndseq(&(0x7f00000003c0)='/dev/snd/seq\x00', 0x0, 0x1) sched_getaffinity(r2, 0x0, 0x0) mmap$perf(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4, 0x8013, r0, 0x0) r6 = dup2(r5, r4) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r6, 0xc08c5332, &(0x7f0000000280)={0x0, 0x0, 0x0, 'queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00'}) getsockopt$sock_cred(r1, 0x1, 0x11, 0x0, &(0x7f0000000640)) ioctl$DRM_IOCTL_MODESET_CTL(0xffffffffffffffff, 0x40086408, &(0x7f0000000600)={0xee2}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(0xffffffffffffffff, 0xc08c5334, &(0x7f00000001c0)={0xf48b, 0x0, 0x0, 'queue0\x00'}) write$sndseq(r4, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @connect}], 0xffffff76) fstatfs(r3, &(0x7f0000005200)=""/4096) ioctl$VHOST_VSOCK_SET_GUEST_CID(r6, 0x4008af60, &(0x7f0000000780)={@hyper}) [ 1111.825923][ T7] device hsr_slave_0 left promiscuous mode [ 1111.864528][ T7] device hsr_slave_1 left promiscuous mode [ 1111.943487][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1112.001080][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1112.039982][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1112.076064][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1112.158407][ T7] bond0 (unregistering): Released all slaves [ 1113.275674][ T5909] IPVS: ftp: loaded support on port[0] = 21 [ 1113.430262][ T5909] chnl_net:caif_netlink_parms(): no params data found [ 1113.481397][ T5909] bridge0: port 1(bridge_slave_0) entered blocking state [ 1113.488468][ T5909] bridge0: port 1(bridge_slave_0) entered disabled state [ 1113.496423][ T5909] device bridge_slave_0 entered promiscuous mode [ 1113.509218][ T5909] bridge0: port 2(bridge_slave_1) entered blocking state [ 1113.516323][ T5909] bridge0: port 2(bridge_slave_1) entered disabled state [ 1113.524231][ T5909] device bridge_slave_1 entered promiscuous mode [ 1113.545362][ T5909] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1113.569147][ T5909] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1113.639399][ T5909] team0: Port device team_slave_0 added [ 1113.652519][ T5909] team0: Port device team_slave_1 added [ 1113.743449][ T5909] device hsr_slave_0 entered promiscuous mode [ 1113.781131][ T5909] device hsr_slave_1 entered promiscuous mode [ 1113.820970][ T5909] debugfs: Directory 'hsr0' with parent '/' already present! [ 1113.864073][ T5909] bridge0: port 2(bridge_slave_1) entered blocking state [ 1113.871228][ T5909] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1113.878575][ T5909] bridge0: port 1(bridge_slave_0) entered blocking state [ 1113.885682][ T5909] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1114.010214][ T5909] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1114.083361][ T5290] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1114.099455][ T5290] bridge0: port 1(bridge_slave_0) entered disabled state [ 1114.171164][ T5290] bridge0: port 2(bridge_slave_1) entered disabled state [ 1114.221462][ T5290] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1114.267715][ T5909] 8021q: adding VLAN 0 to HW filter on device team0 [ 1114.294379][ T5290] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1114.303120][ T5290] bridge0: port 1(bridge_slave_0) entered blocking state [ 1114.310176][ T5290] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1114.360050][ T5934] IPVS: ftp: loaded support on port[0] = 21 [ 1114.406544][ T5909] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1114.411933][ T5935] IPVS: ftp: loaded support on port[0] = 21 [ 1114.416926][ T5909] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1114.441434][ T5937] IPVS: ftp: loaded support on port[0] = 21 [ 1114.451169][ T5290] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1114.459517][ T5290] bridge0: port 2(bridge_slave_1) entered blocking state [ 1114.466592][ T5290] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1114.475767][ T5290] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1114.484312][ T5290] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1114.492747][ T5290] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1114.501167][ T5290] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1114.521193][ T5936] IPVS: ftp: loaded support on port[0] = 21 [ 1114.522187][ T5938] IPVS: ftp: loaded support on port[0] = 21 [ 1114.574593][ T5290] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1114.582699][ T5290] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1114.689337][ T5909] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1114.991077][ T5934] chnl_net:caif_netlink_parms(): no params data found [ 1115.013360][ T5936] chnl_net:caif_netlink_parms(): no params data found [ 1115.043448][ T5938] chnl_net:caif_netlink_parms(): no params data found [ 1115.153100][ T5936] bridge0: port 1(bridge_slave_0) entered blocking state [ 1115.160208][ T5936] bridge0: port 1(bridge_slave_0) entered disabled state [ 1115.168433][ T5936] device bridge_slave_0 entered promiscuous mode [ 1115.177095][ T5936] bridge0: port 2(bridge_slave_1) entered blocking state [ 1115.184221][ T5936] bridge0: port 2(bridge_slave_1) entered disabled state [ 1115.192394][ T5936] device bridge_slave_1 entered promiscuous mode [ 1115.205833][ T5937] chnl_net:caif_netlink_parms(): no params data found [ 1115.220248][ T5935] chnl_net:caif_netlink_parms(): no params data found [ 1115.231326][ T5936] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1115.245777][ T5934] bridge0: port 1(bridge_slave_0) entered blocking state [ 1115.252886][ T5934] bridge0: port 1(bridge_slave_0) entered disabled state [ 1115.260633][ T5934] device bridge_slave_0 entered promiscuous mode [ 1115.276162][ T5936] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1115.328038][ T5937] bridge0: port 1(bridge_slave_0) entered blocking state [ 1115.335184][ T5937] bridge0: port 1(bridge_slave_0) entered disabled state [ 1115.343080][ T5937] device bridge_slave_0 entered promiscuous mode [ 1115.351376][ T5937] bridge0: port 2(bridge_slave_1) entered blocking state [ 1115.358438][ T5937] bridge0: port 2(bridge_slave_1) entered disabled state [ 1115.366330][ T5937] device bridge_slave_1 entered promiscuous mode [ 1115.410664][ T5938] bridge0: port 1(bridge_slave_0) entered blocking state [ 1115.417928][ T5938] bridge0: port 1(bridge_slave_0) entered disabled state [ 1115.425809][ T5938] device bridge_slave_0 entered promiscuous mode [ 1115.451773][ T5957] Dev loop2: unable to read RDB block 1 [ 1115.457382][ T5957] loop2: unable to read partition table [ 1115.463577][ T5957] loop2: partition table beyond EOD, truncated [ 1115.463602][ T5957] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 1115.488200][ T5934] bridge0: port 2(bridge_slave_1) entered blocking state [ 1115.495347][ T5934] bridge0: port 2(bridge_slave_1) entered disabled state [ 1115.503217][ T5934] device bridge_slave_1 entered promiscuous mode [ 1115.516121][ T5936] team0: Port device team_slave_0 added [ 1115.527478][ T5938] bridge0: port 2(bridge_slave_1) entered blocking state [ 1115.534573][ T5938] bridge0: port 2(bridge_slave_1) entered disabled state [ 1115.542715][ T5938] device bridge_slave_1 entered promiscuous mode [ 1115.549864][ T5935] bridge0: port 1(bridge_slave_0) entered blocking state [ 1115.557073][ T5935] bridge0: port 1(bridge_slave_0) entered disabled state [ 1115.564993][ T5935] device bridge_slave_0 entered promiscuous mode [ 1115.602929][ T5937] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1115.613079][ T5936] team0: Port device team_slave_1 added [ 1115.662862][ T5934] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1115.674072][ T5938] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1115.684762][ T5937] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1115.701532][ T5935] bridge0: port 2(bridge_slave_1) entered blocking state 15:53:56 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000100000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 1115.708588][ T5935] bridge0: port 2(bridge_slave_1) entered disabled state [ 1115.716542][ T5935] device bridge_slave_1 entered promiscuous mode [ 1115.773318][ T5936] device hsr_slave_0 entered promiscuous mode [ 1115.801230][ T5936] device hsr_slave_1 entered promiscuous mode [ 1115.850051][ T5936] debugfs: Directory 'hsr0' with parent '/' already present! [ 1115.872398][ T5934] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1115.888639][ T5938] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1115.931784][ T5935] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1115.946434][ T5937] team0: Port device team_slave_0 added [ 1115.974587][ T5934] team0: Port device team_slave_0 added [ 1115.989158][ T5938] team0: Port device team_slave_0 added [ 1116.020144][ T5937] team0: Port device team_slave_1 added [ 1116.028879][ T5938] team0: Port device team_slave_1 added [ 1116.036505][ T5934] team0: Port device team_slave_1 added [ 1116.044412][ T5935] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1116.133611][ T5937] device hsr_slave_0 entered promiscuous mode [ 1116.162409][ T5937] device hsr_slave_1 entered promiscuous mode [ 1116.169366][ T5974] loop2: p1 [ 1116.172679][ T5974] loop2: partition table partially beyond EOD, truncated [ 1116.179944][ T5974] loop2: p1 start 1 is beyond EOD, truncated [ 1116.201301][ T5937] debugfs: Directory 'hsr0' with parent '/' already present! [ 1116.274134][ T5934] device hsr_slave_0 entered promiscuous mode [ 1116.311511][ T5934] device hsr_slave_1 entered promiscuous mode [ 1116.351162][ T5934] debugfs: Directory 'hsr0' with parent '/' already present! [ 1116.393648][ T5938] device hsr_slave_0 entered promiscuous mode [ 1116.431355][ T5938] device hsr_slave_1 entered promiscuous mode [ 1116.471321][ T5938] debugfs: Directory 'hsr0' with parent '/' already present! [ 1116.508138][ T5935] team0: Port device team_slave_0 added 15:53:57 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000800000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 1116.524123][ T5936] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1116.575422][ T5935] team0: Port device team_slave_1 added [ 1116.659601][ T5936] 8021q: adding VLAN 0 to HW filter on device team0 [ 1116.703338][ T5935] device hsr_slave_0 entered promiscuous mode [ 1116.750966][ T5935] device hsr_slave_1 entered promiscuous mode [ 1116.765319][ T5990] loop2: p1 [ 1116.768539][ T5990] loop2: partition table partially beyond EOD, truncated [ 1116.775862][ T5990] loop2: p1 start 1 is beyond EOD, truncated [ 1116.784043][ T5935] debugfs: Directory 'hsr0' with parent '/' already present! [ 1116.801532][ T5963] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1116.809289][ T5963] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1117.291732][ T8335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1117.300346][ T8335] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1117.308736][ T8335] bridge0: port 1(bridge_slave_0) entered blocking state [ 1117.315833][ T8335] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1117.323493][ T8335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1117.332111][ T8335] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1117.340434][ T8335] bridge0: port 2(bridge_slave_1) entered blocking state [ 1117.347522][ T8335] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1117.355149][ T8335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1117.363918][ T8335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1117.372585][ T8335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1117.381225][ T8335] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1117.389597][ T8335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1117.398214][ T8335] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1117.406623][ T8335] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1117.414941][ T8335] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1117.423122][ T8335] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1117.431490][ T8335] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1117.447687][ T5937] 8021q: adding VLAN 0 to HW filter on device bond0 15:53:58 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000001000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 1117.824361][ T5936] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1117.848522][ T5934] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1117.855791][ T5290] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1117.863767][ T5290] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1117.878749][ T5937] 8021q: adding VLAN 0 to HW filter on device team0 [ 1118.197928][ T6020] loop2: p1 [ 1118.201372][ T6020] loop2: partition table partially beyond EOD, truncated [ 1118.208581][ T6020] loop2: p1 start 1 is beyond EOD, truncated [ 1118.340832][ T5938] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1118.351414][ T5548] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1118.359074][ T5548] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1118.642242][ T5936] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1118.654046][ T5934] 8021q: adding VLAN 0 to HW filter on device team0 [ 1118.668859][ T5937] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1118.679433][ T5937] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1118.697603][ T5938] 8021q: adding VLAN 0 to HW filter on device team0 [ 1118.704434][ T5548] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1118.713074][ T5548] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1118.721447][ T5548] bridge0: port 1(bridge_slave_0) entered blocking state [ 1118.728505][ T5548] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1118.736128][ T5548] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1118.745049][ T5548] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1118.753412][ T5548] bridge0: port 2(bridge_slave_1) entered blocking state [ 1118.760462][ T5548] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1118.768002][ T5548] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1118.776752][ T5548] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1118.785504][ T5548] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1118.794111][ T5548] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1118.802505][ T5548] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1118.810159][ T5548] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1118.817887][ T5548] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1118.826641][ T5548] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1118.835093][ T5548] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1118.843520][ T5548] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1118.851989][ T5548] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1118.860358][ T5548] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1118.868589][ T5548] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1118.876257][ T5548] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready 15:53:59 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff070000ffffffffffff07000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 1119.147045][ T6046] Dev loop2: unable to read RDB block 1 [ 1119.152703][ T6046] loop2: unable to read partition table [ 1119.158385][ T6046] loop2: partition table beyond EOD, truncated [ 1119.164615][ T6046] loop_reread_partitions: partition scan of loop2 () failed (rc=-5) [ 1119.232985][ T3521] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1119.241840][ T3521] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1119.250705][ T3521] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1119.258638][ T3521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1119.267213][ T3521] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1119.276182][ T3521] bridge0: port 1(bridge_slave_0) entered blocking state [ 1119.283304][ T3521] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1119.290784][ T3521] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1119.299339][ T3521] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1119.307701][ T3521] bridge0: port 2(bridge_slave_1) entered blocking state [ 1119.314786][ T3521] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1119.322374][ T3521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1119.330966][ T3521] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1119.339603][ T3521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1119.348290][ T3521] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1119.356682][ T3521] bridge0: port 1(bridge_slave_0) entered blocking state [ 1119.363813][ T3521] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1119.371398][ T3521] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1119.380054][ T3521] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1119.388504][ T3521] bridge0: port 2(bridge_slave_1) entered blocking state [ 1119.395587][ T3521] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1119.403170][ T3521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1119.411812][ T3521] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1119.420443][ T3521] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1119.438511][ T5937] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1119.451743][ T5935] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1119.461431][ T3521] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1119.469357][ T3521] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1119.477466][ T3521] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1119.485241][ T3521] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1119.763550][ T6060] loop1: p1 p2 [ 1119.875402][ T5963] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1119.884202][ T5963] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1119.909192][ T5935] 8021q: adding VLAN 0 to HW filter on device team0 15:54:00 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000020000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 1119.926156][ T5934] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1119.938486][ T5934] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network 15:54:01 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000003000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 1120.202864][ T5889] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1120.211767][ T5889] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1120.220160][ T5889] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1120.228696][ T5889] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1120.237165][ T5889] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1120.245550][ T5889] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1120.253875][ T5889] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1120.262353][ T5889] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1120.270629][ T5889] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1120.278412][ T5889] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1120.286178][ T5889] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1120.294554][ T5889] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1120.302918][ T5889] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1120.311216][ T5889] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1120.332768][ T5938] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1120.401908][ T6075] loop2: p1 [ 1120.405135][ T6075] loop2: partition table partially beyond EOD, truncated [ 1120.412531][ T6075] loop2: p1 start 1 is beyond EOD, truncated [ 1120.601874][ T6085] loop1: p1 p2 15:54:01 executing program 2: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000090000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 1120.761657][ T5934] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1120.768938][ T5963] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1120.777058][ T5963] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1120.784718][ T5963] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1120.794935][ T5963] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1120.804021][ T5963] bridge0: port 1(bridge_slave_0) entered blocking state [ 1120.811118][ T5963] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1120.818672][ T5963] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1120.827304][ T5963] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1120.835689][ T5963] bridge0: port 2(bridge_slave_1) entered blocking state [ 1120.842792][ T5963] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1120.850400][ T5963] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1120.859087][ T5963] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1121.071432][ T6104] loop2: p1 [ 1121.074695][ T6104] loop2: partition table partially beyond EOD, truncated [ 1121.082081][ T6104] loop2: p1 start 1 is beyond EOD, truncated [ 1121.259185][ T5963] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1121.267230][ T5963] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1121.275928][ T5963] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1121.284391][ T5963] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1121.293459][ T5963] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1121.301825][ T5963] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1121.310056][ T5963] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1121.327474][ T5938] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1121.353765][ T7] device bridge_slave_1 left promiscuous mode [ 1121.359932][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1121.447030][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1121.474919][ T7] device bridge_slave_1 left promiscuous mode [ 1121.481172][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1121.532853][ T7] device bridge_slave_0 left promiscuous mode [ 1121.539042][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1121.583135][ T7] device bridge_slave_1 left promiscuous mode [ 1121.589315][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1121.641951][ T7] device bridge_slave_0 left promiscuous mode [ 1121.648161][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1121.692666][ T7] device bridge_slave_1 left promiscuous mode [ 1121.698856][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1121.741920][ T7] device bridge_slave_0 left promiscuous mode [ 1121.748090][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1121.784038][ T7] device bridge_slave_1 left promiscuous mode [ 1121.790192][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 1121.832020][ T7] device bridge_slave_0 left promiscuous mode [ 1121.838202][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 1127.837617][ T7] device hsr_slave_0 left promiscuous mode [ 1127.871683][ T7] device hsr_slave_1 left promiscuous mode [ 1127.961495][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1128.001210][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1128.039022][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1128.172509][ T7] bond0 (unregistering): Released all slaves [ 1128.451822][ T7] device hsr_slave_0 left promiscuous mode [ 1128.507797][ T7] device hsr_slave_1 left promiscuous mode [ 1128.596549][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1128.674332][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1128.698464][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1128.752482][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1128.866580][ T7] bond0 (unregistering): Released all slaves [ 1129.111754][ T7] device hsr_slave_0 left promiscuous mode [ 1129.151333][ T7] device hsr_slave_1 left promiscuous mode [ 1129.206649][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1129.219984][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1129.237728][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1129.266931][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1129.388010][ T7] bond0 (unregistering): Released all slaves [ 1129.601661][ T7] device hsr_slave_0 left promiscuous mode [ 1129.641318][ T7] device hsr_slave_1 left promiscuous mode [ 1129.718783][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1129.745847][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1129.805466][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1129.868241][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1129.993721][ T7] bond0 (unregistering): Released all slaves [ 1130.132404][ T7] device hsr_slave_0 left promiscuous mode [ 1130.172790][ T7] device hsr_slave_1 left promiscuous mode [ 1130.222672][ T7] team0 (unregistering): Port device team_slave_1 removed [ 1130.291927][ T7] team0 (unregistering): Port device team_slave_0 removed [ 1130.327666][ T7] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1130.381333][ T7] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1130.443120][ T7] bond0 (unregistering): Released all slaves [ 1130.558611][ T5935] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1130.569856][ T5935] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1130.580069][ T5963] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1130.727949][ T5935] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1130.856375][ T6399] loop4: p1 15:54:11 executing program 4: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000007000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:54:11 executing program 3: bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e23}, 0x1c) listen(0xffffffffffffffff, 0x1fff) r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000280)={0x0, @in={{0xa, 0x0, @local}}, 0x0, 0x0, 0x0, 0x0, 0x300}, 0x9c) 15:54:12 executing program 1: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000000000000000000000000000004000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) 15:54:12 executing program 5: ioctl$VIDIOC_S_JPEGCOMP(0xffffffffffffffff, 0x408c563e, &(0x7f0000000240)={0x0, 0x3, 0x0, "ce58331e67dc61fa650d7e42dc0e6d45e920b84c5502dfac56076036006fb31760723e978f2e5cfc409b89d8a8a48cce6b4f94acb49f688fa517f5ce", 0x0, "0f9b5d42f46cc58bd53c4da38b3459cfd39183400f25f0708d11d53614e455f0689d2a31a5b6e3c009bbb9f939975791721be6680565deda25e1fa35"}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_read_part_table(0x0, 0x6aa3263ba74b415, &(0x7f0000000080)=[{&(0x7f0000000000)="02006300000001000000ff07000014000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000055aa", 0x40, 0x1c0}]) [ 1131.622074][ T5963] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1131.630628][ T5963] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1236.100861][ C1] rcu: INFO: rcu_sched self-detected stall on CPU [ 1236.107470][ C1] rcu: 1-....: (10499 ticks this GP) idle=466/1/0x4000000000000002 softirq=139645/139645 fqs=5249 [ 1236.118469][ C1] (t=10501 jiffies g=217573 q=2147) [ 1236.123743][ C1] NMI backtrace for cpu 1 [ 1236.128077][ C1] CPU: 1 PID: 6418 Comm: syz-executor.0 Not tainted 5.2.0+ #37 [ 1236.135602][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1236.146403][ C1] Call Trace: [ 1236.149684][ C1] [ 1236.152532][ C1] dump_stack+0x1d8/0x2f8 [ 1236.156848][ C1] nmi_cpu_backtrace+0xb0/0x1a0 [ 1236.161688][ C1] ? nmi_trigger_cpumask_backtrace+0x145/0x240 [ 1236.167841][ C1] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 1236.173901][ C1] nmi_trigger_cpumask_backtrace+0x14c/0x240 [ 1236.179876][ C1] arch_trigger_cpumask_backtrace+0x10/0x20 [ 1236.185759][ C1] rcu_dump_cpu_stacks+0x15a/0x220 [ 1236.190862][ C1] rcu_sched_clock_irq+0x7e3/0xfb0 [ 1236.195966][ C1] ? trace_hardirqs_off+0x74/0x80 [ 1236.200990][ C1] update_process_times+0x114/0x170 [ 1236.206192][ C1] tick_sched_timer+0x257/0x410 [ 1236.211058][ C1] ? tick_setup_sched_timer+0x2b0/0x2b0 [ 1236.216618][ C1] __hrtimer_run_queues+0x471/0x8c0 [ 1236.221843][ C1] ? hrtimer_interrupt+0xd80/0xd80 [ 1236.226967][ C1] ? ktime_get_update_offsets_now+0x234/0x250 [ 1236.233047][ C1] hrtimer_interrupt+0x36c/0xd80 [ 1236.238008][ C1] smp_apic_timer_interrupt+0xc2/0x220 [ 1236.243463][ C1] apic_timer_interrupt+0xf/0x20 [ 1236.248400][ C1] [ 1236.251340][ C1] RIP: 0010:_raw_spin_unlock_irqrestore+0xad/0xd0 [ 1236.257759][ C1] Code: b9 00 00 00 00 00 fc ff df 80 3c 08 00 74 0c 48 c7 c7 80 87 ca 88 e8 b2 3a 0a fa 48 83 3d 8a a5 23 01 00 74 19 4c 89 f7 57 9d <0f> 1f 44 00 00 65 83 05 42 1b 5b 78 ff 5b 41 5e 5d c3 0f 0b 0f 0b [ 1236.277370][ C1] RSP: 0018:ffff8880872df870 EFLAGS: 00000282 ORIG_RAX: ffffffffffffff13 [ 1236.285773][ C1] RAX: 1ffffffff11950f0 RBX: ffff88809f87ea98 RCX: dffffc0000000000 [ 1236.293735][ C1] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000282 [ 1236.301778][ C1] RBP: ffff8880872df880 R08: ffff8880971aced0 R09: fffffbfff13bc0b7 [ 1236.309734][ C1] R10: fffffbfff13bc0b7 R11: 0000000000000000 R12: 0000000000000282 [ 1236.317979][ C1] R13: 1ffff11010bda33d R14: 0000000000000282 R15: ffff88809f87ea90 [ 1236.325964][ C1] snd_seq_prioq_cell_out+0x297/0x440 [ 1236.331330][ C1] snd_seq_check_queue+0x13e/0x3b0 [ 1236.336443][ C1] snd_seq_enqueue_event+0x3a1/0x590 [ 1236.341716][ C1] ? __kasan_check_write+0x14/0x20 [ 1236.346822][ C1] snd_seq_client_enqueue_event+0x316/0x4e0 [ 1236.352705][ C1] ? snd_seq_kernel_client_enqueue+0x370/0x370 [ 1236.358850][ C1] ? __kasan_check_write+0x14/0x20 [ 1236.363948][ C1] ? _copy_from_user+0x11a/0x180 [ 1236.368874][ C1] snd_seq_write+0x723/0xac0 [ 1236.373478][ C1] ? __perf_event_task_sched_in+0x628/0x7c0 [ 1236.379378][ C1] ? snd_seq_read+0x7d0/0x7d0 [ 1236.384047][ C1] ? rcu_lock_release+0xd/0x30 [ 1236.388793][ C1] ? snd_seq_read+0x7d0/0x7d0 [ 1236.393458][ C1] __vfs_write+0xf9/0x7d0 [ 1236.397776][ C1] ? __lock_acquire+0x4750/0x4750 [ 1236.402818][ C1] ? __kernel_write+0x350/0x350 [ 1236.407653][ C1] ? __fget+0x4ad/0x570 [ 1236.411803][ C1] ? rcu_lock_release+0x26/0x30 [ 1236.416639][ C1] ? __fget+0x52a/0x570 [ 1236.420790][ C1] ? security_file_permission+0x148/0x350 [ 1236.426501][ C1] ? rw_verify_area+0x1c2/0x360 [ 1236.431343][ C1] ? __kasan_check_read+0x11/0x20 [ 1236.436353][ C1] vfs_write+0x275/0x590 [ 1236.440588][ C1] ksys_write+0x16b/0x2a0 [ 1236.444913][ C1] ? __ia32_sys_read+0x90/0x90 [ 1236.449662][ C1] ? prepare_exit_to_usermode+0x1f7/0x580 [ 1236.455370][ C1] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1236.460815][ C1] ? trace_irq_disable_rcuidle+0x23/0x1c0 [ 1236.466518][ C1] ? do_syscall_64+0x1d/0x140 [ 1236.471182][ C1] __x64_sys_write+0x7b/0x90 [ 1236.475904][ C1] do_syscall_64+0xfe/0x140 [ 1236.480404][ C1] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1236.486280][ C1] RIP: 0033:0x459829 [ 1236.490164][ C1] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1236.509759][ C1] RSP: 002b:00007f451e678c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 1236.518157][ C1] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459829 [ 1236.526113][ C1] RDX: 00000000ffffff76 RSI: 0000000020000000 RDI: 0000000000000006 [ 1236.534184][ C1] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1236.542143][ C1] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f451e6796d4 [ 1236.550115][ C1] R13: 00000000004c98c0 R14: 00000000004e0d38 R15: 00000000ffffffff