88e20480e58beef1b69ef0bb23189cf7ba24ab0e445ddebf8a4", 0x81}, {&(0x7f000000d480)="1c8c703be2c79bbc318a6c5104664287330d2402cd9f29cedb049b94d028d1f1790a7f0aa85e3aebdf49093f297db9525e4454c527906bb0576d94b9ca0dd50c9d4349f35cb9dfed148437724b449436037736cd3e129f386a514da4c9b35dc959746e123b11ec97a3969f67a4aaf8cdb61a21ca2b6b3c46a794f87645aab87dd4d1589e3a7200835149189bbf9c68d05ec2adf9b543da11a14c358ff6b0dcd2bada01f977a9ad79f618110ca2bfc52bc65954ce42f4b85afe88fc2b6ce79ca66aac9d3fa88e75db185a23f1c691eaa33548e10fe3ddcab2d6d0cba3ff525ad3e96338", 0xe3}], 0x2, &(0x7f000000d5c0)=[{0x60, 0x0, 0x4, "4cfe9a64acdbc370f04c8c78fed02d26e246b17d33a37c11f80a7230e27618118d3497c9f1653a636a5beae203613456f388b94039a253acca8946fc3151229381cedbc3f2adfefbf7cb9aa2183404"}, {0xe0, 0x109, 0xffff, "79f73481c0d39d75b403436b3190b3fb5b7c04cfc28eeb439ea0d66de5140dab157111c56873a82ab076e8e0209a9213b11352a7550863010a76e945a4b030e7635d598fb782125826654ef3eb3738d5548ba7206df2264fbcfd0e196c22065f671ddaf563fd7190b39fbee647828033a55d37342d32aa3e2a3a2166c5f986e6bb74126c4326e2dc3366fd66e81c5adbbd702a2b245ca288c2a38a18c6cb4d534d8e4039899988413196805254858c84bfe619ba1bce0cddbedab4d71fd79fed8a5d8a00ae47de613b7b88b05e42"}, {0x48, 0x115, 0x323, "2ec0a98806a4ff967c31dc92a2dabffa7d1b958643453efb67baa02478945112f50c54b5bbb60b0740b724285401e0adfd"}, {0x1010, 0x112, 0x400, "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"}], 0x1198}, 0x5c}], 0x9, 0x8840)
connect$pppoe(r1, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'bond0\x00'}}, 0x1e)
sendmmsg(r1, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0)
stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
stat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0})
fchown(r0, r2, r3)
r4 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x221d5bee, 0x10000)
setns(r4, 0x40020000)
connect$can_bcm(r1, &(0x7f0000000000), 0x10)

[  973.479367]  loop1: p1 < > p4
[  973.524558] loop1: partition table partially beyond EOD, truncated
[  973.549751] loop1: p1 size 2 extends beyond EOD, truncated
[  973.636889] loop1: p4 start 1854537728 is beyond EOD, truncated
[  973.765111] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
[  973.879782] buffer_io_error: 60 callbacks suppressed
[  973.879793] Buffer I/O error on dev loop1p1, logical block 0, async page read
[  973.903208] Buffer I/O error on dev loop1p1, logical block 0, async page read
[  973.910801] Buffer I/O error on dev loop1p1, logical block 0, async page read
[  973.918675] Buffer I/O error on dev loop1p1, logical block 0, async page read
[  973.927164] Buffer I/O error on dev loop1p1, logical block 0, async page read
[  973.935345] Buffer I/O error on dev loop1p1, logical block 0, async page read
[  973.943093] Buffer I/O error on dev loop1p1, logical block 0, async page read
[  973.951199] Buffer I/O error on dev loop1p1, logical block 0, async page read
[  973.959116] Buffer I/O error on dev loop1p1, logical block 0, async page read
[  973.967642] Buffer I/O error on dev loop1p1, logical block 0, async page read
03:45:37 executing program 4:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0d*\x02\x00', @ifru_flags})

03:45:37 executing program 2:
r0 = socket$inet_tcp(0x2, 0x3, 0x6)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = socket$pppoe(0x18, 0x1, 0x0)
getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000000)={<r2=>0x0, 0x8e}, &(0x7f0000000040)=0x8)
getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000100)={0x81, 0x3, 0x204, 0x3, 0x2, 0x7fff, 0xff, 0x101, r2}, &(0x7f0000000140)=0x20)
ftruncate(r1, 0x2)
connect$pppoe(r1, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'bond0\x00'}}, 0x1e)
socket$inet_tcp(0x2, 0x1, 0x0)
sendmmsg(r1, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0)

03:45:37 executing program 3:
r0 = getpgid(0x0)
r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2)
perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8)
pipe(&(0x7f00000000c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
r4 = socket$inet_udp(0x2, 0x2, 0x0)
close(r4)
write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
connect(r1, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x4, 0x81, 0x800000000000000, 0x6, @dev={[], 0x1f}}, 0x80)
socket$inet(0x2, 0x3, 0x7f)
r5 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r3, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r2, 0x0, r4, 0x0, 0x10005, 0x0)

03:45:37 executing program 0:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
r3 = socket$inet(0x2, 0x3, 0x7f)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r3, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

03:45:37 executing program 1:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r1, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

03:45:37 executing program 5:
r0 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0)
fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000040)=0x2)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = socket$pppoe(0x18, 0x1, 0x0)
r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x20000, 0x0)
getsockopt$inet_int(r2, 0x0, 0x15, &(0x7f0000000280), &(0x7f0000000180)=0xffa2)
ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000200)={0x22, 0x3a, 0xe, 0x3, 0xa, 0x8e7, 0x6, 0x101, 0x1})
connect$pppoe(r1, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e)
ioctl$ASHMEM_GET_PIN_STATUS(r2, 0x7709, 0x0)
sendmmsg(r1, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0)

03:45:37 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x1, @link_local, 'bond0\x00'}}, 0x1e)
sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0)

03:45:37 executing program 2:
r0 = socket$inet_tcp(0x2, 0x3, 0x6)
r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'vcan0\x00'})
r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x1, 0x0)
ioctl$VIDIOC_S_TUNER(r2, 0x4054561e, &(0x7f0000000240)={0x3, "19aacab3fe17c956f1d4e83d79d480b294c4237b7eb11f3d3fc65f0beac738d6", 0x2, 0x20, 0x1, 0x1, 0x5, 0x2, 0x7fff, 0x2})
r3 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r3, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'bond0\x00'}}, 0x1e)
sendmmsg(r3, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0)
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={<r4=>0x0, r1, 0x0, 0xfffffffffffffce2, &(0x7f0000000200)='posix_acl_access\x00', 0xffffffffffffffff}, 0xffffffffffffffe7)
openat$hwrng(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hwrng\x00', 0x480000, 0x0)
perf_event_open(&(0x7f0000000100)={0x7, 0x70, 0x7fff, 0x898, 0x1, 0x2, 0x0, 0xbbad, 0x4, 0xe, 0x80000001, 0x7e8, 0x401, 0x2, 0x4, 0x131bf63b, 0x8, 0x1, 0x2, 0x2, 0x0, 0x3, 0x4, 0x58, 0x200, 0x80, 0x20, 0x9, 0x55, 0x4, 0x8, 0x3, 0x5, 0x4, 0x3, 0x3, 0x2, 0xffffffff00000000, 0x0, 0x3, 0x7, @perf_bp={&(0x7f0000000000), 0xb}, 0x80, 0x0, 0xfffffffffffff144, 0xf, 0x2, 0x2, 0x5}, r4, 0x6, r1, 0x0)

[  974.214028] net_ratelimit: 19 callbacks suppressed
[  974.214036] protocol 88fb is buggy, dev hsr_slave_0
[  974.224174] protocol 88fb is buggy, dev hsr_slave_1
[  974.229272] protocol 88fb is buggy, dev hsr_slave_0
[  974.234360] protocol 88fb is buggy, dev hsr_slave_1
[  974.286271] IPVS: ftp: loaded support on port[0] = 21
[  974.407362]  loop1: p1 < > p4
[  974.410781] loop1: partition table partially beyond EOD, truncated
[  974.561556] loop1: p1 size 2 extends beyond EOD, truncated
[  974.629905] loop1: p4 start 1854537728 is beyond EOD, truncated
[  974.790280] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
03:45:37 executing program 1:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r1, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

03:45:38 executing program 3:
r0 = getpgid(0x0)
r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2)
perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8)
pipe(&(0x7f00000000c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
r4 = socket$inet_udp(0x2, 0x2, 0x0)
close(r4)
write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
connect(r1, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x4, 0x81, 0x800000000000000, 0x6, @dev={[], 0x1f}}, 0x80)
socket$inet(0x2, 0x3, 0x7f)
r5 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r3, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
splice(r2, 0x0, r4, 0x0, 0x10005, 0x0)

03:45:38 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e)
sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0)
prctl$PR_MPX_ENABLE_MANAGEMENT(0x2b)

[  975.213504]  loop1: p1 < > p4
[  975.227964] loop1: partition table partially beyond EOD, truncated
03:45:38 executing program 0:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
r3 = socket$inet(0x2, 0x3, 0x7f)
r4 = socket$packet(0x11, 0x3, 0x300)
socket$inet_dccp(0x2, 0x6, 0x0)
setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
ioctl$KVM_SMI(r0, 0xaeb7)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
ioctl$sock_inet_SIOCSIFPFLAGS(r3, 0x8934, &(0x7f0000000040)={'ip6_vti0\x00', 0xff})
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[  975.283348] loop1: p1 size 2 extends beyond EOD, truncated
[  975.368587] loop1: p4 start 1854537728 is beyond EOD, truncated
[  975.414053] protocol 88fb is buggy, dev hsr_slave_0
[  975.414058] protocol 88fb is buggy, dev hsr_slave_0
[  975.414091] protocol 88fb is buggy, dev hsr_slave_1
[  975.419196] protocol 88fb is buggy, dev hsr_slave_1
[  975.424300] protocol 88fb is buggy, dev hsr_slave_0
[  975.439383] protocol 88fb is buggy, dev hsr_slave_1
[  975.481455] IPVS: ftp: loaded support on port[0] = 21
[  975.655153] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
03:45:40 executing program 1:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r1, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

03:45:40 executing program 2:
r0 = socket$inet_tcp(0x2, 0x3, 0x6)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r1, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'bond0\x00'}}, 0x1e)
r2 = socket$alg(0x26, 0x5, 0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
bind$alg(r2, &(0x7f0000002640)={0x26, 'aead\x00', 0x0, 0x0, 'rfc7539(cfb(twofish),rmd128-generic)\x00'}, 0x58)
setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000001400)="b7d9288a911993f0265df5cf1cdd8b55b062950b86bc01abc8464d4f8a906151", 0x20)
r4 = accept$alg(r2, 0x0, 0x0)
sendmsg$alg(r4, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001340)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0)
r5 = dup3(r4, r2, 0x0)
write$UHID_INPUT(r5, &(0x7f0000001440)={0x8, "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", 0x1000}, 0x1006)
recvmmsg(r4, &(0x7f0000008cc0)=[{{0x0, 0x0, &(0x7f0000003a40)=[{&(0x7f00000002c0)=""/4096, 0x2000}], 0x1, 0x0, 0x5c}}], 0x1, 0x0, 0x0)
ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000000))
sendmmsg(r1, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0)

03:45:40 executing program 3:
r0 = getpgid(0x0)
r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2)
perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8)
pipe(&(0x7f00000000c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
r4 = socket$inet_udp(0x2, 0x2, 0x0)
close(r4)
write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
connect(r1, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x4, 0x81, 0x800000000000000, 0x6, @dev={[], 0x1f}}, 0x80)
socket$inet(0x2, 0x3, 0x7f)
r5 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r3, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
splice(r2, 0x0, r4, 0x0, 0x10005, 0x0)

03:45:40 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e)
pipe(&(0x7f0000000000)={0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000040)={0x7, <r2=>0x0, 0x10000, 0x3ff})
ioctl$DRM_IOCTL_SG_ALLOC(r1, 0xc0106438, &(0x7f0000000100)={0x0, r2})
sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0)

03:45:40 executing program 0:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @loopback}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

03:45:40 executing program 4:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0e*\x02\x00', @ifru_flags})

[  977.813058] IPVS: ftp: loaded support on port[0] = 21
[  977.997401]  loop1: p1 < > p4
[  978.009226] loop1: partition table partially beyond EOD, truncated
[  978.044738] loop1: p1 size 2 extends beyond EOD, truncated
[  978.120006] loop1: p4 start 1854537728 is beyond EOD, truncated
03:45:41 executing program 2:
socket$inet_tcp(0x2, 0x3, 0x6)
r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2000, 0x108)
r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82)
ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = socket$pppoe(0x18, 0x1, 0x0)
r3 = shmget(0x1, 0x4000, 0x54000000, &(0x7f0000ffa000/0x4000)=nil)
shmctl$SHM_STAT(r3, 0xd, &(0x7f0000000100)=""/65)
connect$pppoe(r2, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'bond0\x00'}}, 0x1e)
openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x84201, 0x0)
sendmmsg(r2, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0)

[  978.402308] print_req_error: 78 callbacks suppressed
[  978.402320] print_req_error: I/O error, dev loop1, sector 0 flags 80700
[  978.415013] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
[  978.443630] print_req_error: I/O error, dev loop1, sector 0 flags 0
[  978.450680] print_req_error: I/O error, dev loop1, sector 0 flags 0
[  978.459104] print_req_error: I/O error, dev loop1, sector 0 flags 0
[  978.467137] print_req_error: I/O error, dev loop1, sector 0 flags 0
[  978.475486] print_req_error: I/O error, dev loop1, sector 0 flags 0
[  978.484679] print_req_error: I/O error, dev loop1, sector 0 flags 0
03:45:41 executing program 2:
socket$inet_tcp(0x2, 0x3, 0x6)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'bond0\x00'}}, 0x1e)
sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0)
r1 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x2, 0x2)
r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00')
r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/audio\x00', 0x200100, 0x0)
linkat(r1, &(0x7f0000000200)='./file0\x00', r3, &(0x7f0000000280)='./file0\x00', 0x1000)
ioctl$BLKGETSIZE64(r1, 0x80081272, &(0x7f00000002c0))
connect$pppoe(r1, &(0x7f0000000300)={0x18, 0x0, {0x1, @broadcast, 'veth0_to_bond\x00'}}, 0x1e)
arch_prctl$ARCH_SET_CPUID(0x1012, 0x1)
sendmsg$TIPC_CMD_GET_MAX_PORTS(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, r2, 0x100, 0x70bd2c, 0x25dfdbff, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x8001)

03:45:41 executing program 5:
r0 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x8, 0x40)
r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0)
r2 = socket$pppoe(0x18, 0x1, 0x0)
getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000000)={<r3=>0x0, 0x3}, &(0x7f0000000040)=0x8)
setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000100)={r3, 0x0, 0x7ff}, 0x8)
connect$pppoe(r2, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e)
sendmmsg(r2, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0)

[  978.491668] print_req_error: I/O error, dev loop1, sector 0 flags 0
[  978.502146] print_req_error: I/O error, dev loop1, sector 0 flags 0
[  978.510617] print_req_error: I/O error, dev loop1, sector 0 flags 0
03:45:41 executing program 1:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r1, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

03:45:41 executing program 3:
r0 = getpgid(0x0)
r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2)
perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8)
pipe(&(0x7f00000000c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
r4 = socket$inet_udp(0x2, 0x2, 0x0)
close(r4)
write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
connect(r1, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x4, 0x81, 0x800000000000000, 0x6, @dev={[], 0x1f}}, 0x80)
socket$inet(0x2, 0x3, 0x7f)
r5 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r3, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
splice(r2, 0x0, r4, 0x0, 0x10005, 0x0)

03:45:41 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$pppoe(0x18, 0x1, 0x0)
r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0)
connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e)
sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0)
getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000040), 0x2)

03:45:41 executing program 0:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
fcntl$addseals(r3, 0x409, 0xe)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

03:45:41 executing program 2:
socket$inet_tcp(0x2, 0x3, 0x6)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'bond0\x00'}}, 0x1e)
ioctl$sock_inet_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000000)={'veth1_to_bond\x00', {0x2, 0x4e21, @multicast1}})
r1 = syz_open_dev$amidi(&(0x7f0000000140)='/dev/amidi#\x00', 0x9, 0x40)
ioctl$EVIOCSABS0(r1, 0x401845c0, &(0x7f0000000100)={0xb176, 0xfffffffffffffc00, 0x401, 0x6, 0xfffffffffffff7e8, 0x800})
sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0)

[  979.013853]  loop1: p1 < > p4
[  979.021182] loop1: partition table partially beyond EOD, truncated
03:45:42 executing program 2:
socket$inet_tcp(0x2, 0x3, 0x6)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'bond0\x00'}}, 0x1e)
sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000000000)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x11dc, &(0x7f0000000100), 0xfffffeca}}], 0x1, 0x4000)
ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x4, 0x5, 0x6})

03:45:42 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x80004, @link_local, 'ip6gretap0\x00'}}, 0x1e)
sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0)

[  979.106114] loop1: p1 size 2 extends beyond EOD, truncated
[  979.144954] loop1: p4 start 1854537728 is beyond EOD, truncated
03:45:42 executing program 4:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0f*\x02\x00', @ifru_flags})

[  979.319984] buffer_io_error: 20 callbacks suppressed
[  979.319994] Buffer I/O error on dev loop1p1, logical block 0, async page read
[  979.333567] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
[  979.341110] Buffer I/O error on dev loop1p1, logical block 0, async page read
[  979.349184] Buffer I/O error on dev loop1p1, logical block 0, async page read
[  979.357553] Buffer I/O error on dev loop1p1, logical block 0, async page read
03:45:42 executing program 2:
r0 = socket$inet_tcp(0x2, 0x3, 0x6)
r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r2 = socket$pppoe(0x18, 0x1, 0x0)
lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r3=>0x0})
mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='overlay\x00', 0x2010080, &(0x7f00000001c0)={[{@workdir={'workdir', 0x3d, './file0'}}, {@nfs_export_on='nfs_export=on'}, {@index_off='index=off'}, {@workdir={'workdir', 0x3d, './file0'}}, {@workdir={'workdir', 0x3d, './file0'}}], [{@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@smackfshat={'smackfshat', 0x3d, 'vmnet0em0selinux@'}}, {@measure='measure'}, {@smackfsfloor={'smackfsfloor', 0x3d, '0'}}, {@subj_type={'subj_type', 0x3d, 'bond0\x00'}}, {@smackfsdef={'smackfsdef', 0x3d, 'em1#'}}, {@uid_gt={'uid>', r3}}]})
r4 = getpid()
ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f00000002c0)=r4)
connect$pppoe(r2, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'bond0\x00'}}, 0x1e)
perf_event_open(&(0x7f0000000340)={0x4, 0x70, 0x4, 0xd9, 0x8, 0x6, 0x0, 0x461, 0x80080, 0x2, 0x6cdd, 0xffff, 0x2, 0x9, 0x8, 0xffffffffffffffe0, 0x3732f053, 0xfffffffffffffffd, 0x0, 0x9, 0x16f, 0x1, 0x7fff, 0x2, 0x6e0, 0x2, 0x6, 0xfffffffffffffff9, 0x9, 0x8, 0xffffffff, 0x8, 0x9, 0x7ff, 0xfffffffeffffffff, 0x9, 0x41, 0x7f, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000300), 0x2}, 0x1082, 0x5, 0x8, 0xf, 0x3f, 0x1, 0x101}, r4, 0x4, r1, 0x2)
sendmmsg(r2, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0)

[  979.365413] Buffer I/O error on dev loop1p1, logical block 0, async page read
[  979.373424] Buffer I/O error on dev loop1p1, logical block 0, async page read
[  979.381360] Buffer I/O error on dev loop1p1, logical block 0, async page read
[  979.389192] Buffer I/O error on dev loop1p1, logical block 0, async page read
[  979.397057] Buffer I/O error on dev loop1p1, logical block 0, async page read
[  979.413383] Buffer I/O error on dev loop1p1, logical block 0, async page read
[  979.486377] IPVS: ftp: loaded support on port[0] = 21
03:45:42 executing program 1:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r1, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

[  979.574055] net_ratelimit: 8 callbacks suppressed
[  979.574063] protocol 88fb is buggy, dev hsr_slave_0
[  979.584063] protocol 88fb is buggy, dev hsr_slave_0
[  979.584104] protocol 88fb is buggy, dev hsr_slave_1
[  979.589121] protocol 88fb is buggy, dev hsr_slave_1
[  979.594217] protocol 88fb is buggy, dev hsr_slave_0
[  979.604249] protocol 88fb is buggy, dev hsr_slave_1
03:45:42 executing program 2:
socket$inet_tcp(0x2, 0x3, 0x6)
socket$pppoe(0x18, 0x1, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'bond0\x00'}}, 0x1e)
sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0)

03:45:42 executing program 3:
r0 = getpgid(0x0)
r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2)
perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8)
pipe(&(0x7f00000000c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
r4 = socket$inet_udp(0x2, 0x2, 0x0)
close(r4)
write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
connect(r1, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x4, 0x81, 0x800000000000000, 0x6, @dev={[], 0x1f}}, 0x80)
socket$inet(0x2, 0x3, 0x7f)
r5 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r3, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r2, 0x0, r4, 0x0, 0x10005, 0x0)

[  979.911816]  loop1: p1 < > p4
[  979.942745] loop1: partition table partially beyond EOD, truncated
[  979.998866] loop1: p1 size 2 extends beyond EOD, truncated
03:45:43 executing program 0:
r0 = syz_open_dev$sndpcmp(&(0x7f00000004c0)='/dev/snd/pcmC#D#p\x00', 0x6, 0x200)
ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0)
pipe(&(0x7f00000000c0)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = socket$inet_udp(0x2, 0x2, 0x0)
close(r3)
write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
getsockname$packet(r1, &(0x7f0000000080)={0x11, 0x0, <r4=>0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000100)=0x14)
clock_gettime(0xfffffffffffffffe, &(0x7f00000003c0)={<r5=>0x0, <r6=>0x0})
sendmsg$can_bcm(r2, &(0x7f0000000380)={&(0x7f0000000240)={0x1d, r4}, 0x10, &(0x7f0000000340)={&(0x7f00000002c0)={0x6, 0x280, 0x7, {0x0, 0x7530}, {r5, r6/1000+10000}, {0x4, 0x2, 0x500, 0x3ff}, 0x1, @can={{0x0, 0x7a4, 0x5, 0x2}, 0x2, 0x1, 0x0, 0x0, "6db6467b93cdfa5f"}}, 0x48}, 0x1, 0x0, 0x0, 0x40000}, 0x20000800)
socket$inet(0x2, 0x3, 0x7f)
rt_sigsuspend(&(0x7f0000000440)={0x4e20}, 0x8)
setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000400)={0x45c, 0x7, 0x2000}, 0x4)
r7 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000480)={0x400000, 0x5, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r2, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r8 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x100, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
connect$can_bcm(r8, &(0x7f0000000000)={0x1d, r4}, 0xfffffffffffffe39)
bind$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r3, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r1, 0x0, r3, 0x0, 0x10005, 0x0)
setsockopt$inet_dccp_int(r2, 0x21, 0x1b, &(0x7f0000000280), 0x4)

[  980.075874] loop1: p4 start 1854537728 is beyond EOD, truncated
03:45:43 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r1, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e)
sendmmsg(r1, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0)
ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0)

03:45:43 executing program 2:
r0 = socket$inet_tcp(0x2, 0x3, 0x6)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x100000}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r1, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'bond0\x00'}}, 0x1e)
r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00')
sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="1c010000afa1e0d99c424f3d9870f81568abd42aa8518eda2f37dca882000000000000000000000000000045248d43ef5b8abf819b3c9a043117ad3a61bdd5ab83f87ae4fa7b5748d7c0f18fe526e93c6004c180a1155bdc9e3fc9ca5e8f7d4bd713897b2aede43df7cdc846214b627b3af7b5c4e4fdbd26a6a0666a3a67c8aa4e91eeb1a923cec747ac1102239cce29c7eeec1451f0f69dedfe59026ca05d2baa5ce63ee23e4c70b1f42975b8c182d1e9f228ae193a16b9", @ANYRES16=r2, @ANYBLOB="01002cbd7000fbdbdf25040000000800060004000000"], 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x20000000)
sendmmsg(r1, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0)

[  980.260417] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
[  980.384031] protocol 88fb is buggy, dev hsr_slave_0
[  980.389186] protocol 88fb is buggy, dev hsr_slave_1
03:45:43 executing program 1:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r1, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

03:45:43 executing program 2:
socket$inet_tcp(0x2, 0x3, 0x6)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$pppoe(0x18, 0x1, 0x0)
r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xfffffffffffffb8b, 0x10042)
write$P9_RRENAMEAT(r1, &(0x7f0000000040)={0x7, 0x4b, 0x1}, 0x7)
connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'bond0\x00'}}, 0x1e)
sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100), 0x33f}}], 0x1b3, 0x0)

[  980.454076] protocol 88fb is buggy, dev hsr_slave_0
[  980.459253] protocol 88fb is buggy, dev hsr_slave_1
03:45:43 executing program 3:
r0 = getpgid(0x0)
r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2)
perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8)
pipe(&(0x7f00000000c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
r4 = socket$inet_udp(0x2, 0x2, 0x0)
close(r4)
write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
connect(r1, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x4, 0x81, 0x800000000000000, 0x6, @dev={[], 0x1f}}, 0x80)
socket$inet(0x2, 0x3, 0x7f)
r5 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r3, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r2, 0x0, r4, 0x0, 0x10005, 0x0)

[  980.787716]  loop1: p1 < > p4
[  980.806074] loop1: partition table partially beyond EOD, truncated
03:45:43 executing program 4:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0g*\x02\x00', @ifru_flags})

[  980.869919] loop1: p1 size 2 extends beyond EOD, truncated
[  980.909127] loop1: p4 start 1854537728 is beyond EOD, truncated
[  981.007962] IPVS: ftp: loaded support on port[0] = 21
[  981.108914] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
03:45:44 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x800003, 0xffffffffffffffff, 0x0)
r0 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e)
r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000100)='/dev/cachefiles\x00', 0x80000, 0x0)
ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000140)=0x1ff)
sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0)
r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x60980, 0x30)
getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000240)={@local, <r3=>0x0}, &(0x7f0000000280)=0x14)
r4 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2)
ioctl$VIDIOC_S_AUDOUT(r4, 0x40345632, &(0x7f0000000140)={0xfffffffffffff001, "158dd9f6bbfba73b455a717b1129351aa02d54bd1736c8483ff29965f3e118d5"})
sendto$packet(r2, &(0x7f0000000040)="1b86a951d16f06c681c7", 0xa, 0x20000040, &(0x7f00000002c0)={0x11, 0x1f, r3, 0x1, 0x8}, 0x14)

03:45:44 executing program 1:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r1, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

03:45:44 executing program 0:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
sendto$inet(r1, &(0x7f0000000240)="65f1e58be3b7e9c98aef543b981f78687f1c98e7b872632a32790547bf3bedf1808d5fd21c0d20baf636c765d8048ae918fe21d9f730e31ca8e4d621a97fc66081b4f28510069a672c6b8b8b39e62b83b4db45ecac1258f82bda11282b19009cf3a5a04a2cbf6ba4ea06008c90970dce0a7292fc7f318c991f191543335e2574d129dbfb4fade3ccca5c69c99eb3ca527c61badab50ef3e2e4337a89d60d81e808ded9b996fe9af338b555312d632c67d53dd92f7b1b5a206ed88dbd9c32c766b0cdb2b3c2e912ef9c8150bd20ccc23ecddea5a27a0a0ab4400ac621", 0xdc, 0x8000, &(0x7f0000000040)={0x2, 0x4e23, @loopback}, 0x10)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

03:45:44 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x101, 0x840)
ioctl$KVM_S390_UCAS_MAP(r1, 0x4018ae50, &(0x7f00000001c0)={0xfffffffffffffff8, 0xc1, 0x8})
r2 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r2, &(0x7f0000009000)={0x18, 0x0, {0xffffffbfffffffff, @link_local, 'bond0\x00'}}, 0x1e)
recvmmsg(r2, &(0x7f0000008e00)=[{{&(0x7f000000a240)=@caif=@rfm, 0x80, &(0x7f00000025c0)=[{&(0x7f0000000200)=""/33, 0x21}, {&(0x7f0000000240)=""/41, 0x1}, {&(0x7f0000009140)=""/198, 0xc6}, {&(0x7f0000000380)=""/212, 0xd4}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/67, 0x43}, {&(0x7f0000001500)=""/188, 0xbc}, {&(0x7f0000009240)=""/4096, 0x1000}], 0x8, &(0x7f0000002640)=""/47, 0x2f}}, {{&(0x7f0000002680)=@isdn, 0x80, &(0x7f0000002800)=[{&(0x7f0000002700)=""/197, 0xc5}, {&(0x7f0000002a00)=""/4096, 0xfffffffffffffc2e}], 0x2, &(0x7f0000002840)=""/194, 0xc2}, 0x4}, {{&(0x7f0000003a00)=@tipc=@name, 0x80, &(0x7f0000000080)=[{&(0x7f0000002940)=""/10, 0xa}], 0x1, &(0x7f0000003ac0)=""/95, 0x5f}, 0x4}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f00000040c0)=[{&(0x7f0000003bc0)=""/18, 0x12}, {&(0x7f0000003c00)=""/153, 0x55}, {&(0x7f0000003cc0)=""/149, 0x95}, {&(0x7f0000003d80)=""/80, 0x50}, {&(0x7f0000003e00)=""/24, 0x18}, {&(0x7f0000003e40)=""/140, 0xffffffffffffff05}, {&(0x7f0000003f00)=""/133, 0x85}, {&(0x7f0000003fc0)=""/245, 0xf5}], 0x8, &(0x7f0000004140)=""/107, 0x6b}, 0xf25b}, {{&(0x7f00000041c0)=@vsock, 0x80, &(0x7f00000064c0)=[{&(0x7f0000004240)=""/250, 0xfa}, {&(0x7f0000004340)=""/4096, 0x1000}, {&(0x7f0000005340)=""/4096, 0x1000}, {&(0x7f0000006340)=""/175, 0xaf}, {&(0x7f0000006400)=""/153, 0x99}], 0x5, &(0x7f0000006540)=""/238, 0xee}, 0x4}, {{&(0x7f0000006640)=@isdn, 0x80, &(0x7f0000006780)=[{&(0x7f00000066c0)=""/148, 0x94}], 0x1, &(0x7f00000067c0)=""/201, 0xc9}, 0x4}, {{&(0x7f0000009040)=@ethernet, 0x80, &(0x7f0000008d40)=[{&(0x7f0000006940)=""/25, 0x19}, {&(0x7f0000006980)=""/47, 0x2f}, {&(0x7f00000069c0)=""/247, 0xf7}, {&(0x7f0000006ac0)=""/4096, 0x1000}, {&(0x7f0000007ac0)=""/235, 0xeb}, {&(0x7f0000007bc0)=""/166, 0xa6}, {&(0x7f0000007c80)=""/88, 0x58}, {&(0x7f0000007d00)=""/39, 0x27}, {&(0x7f0000007d40)=""/4096, 0x1000}], 0x9}, 0x7fff}], 0x7, 0x20, &(0x7f0000008fc0)={0x77359400})
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
close(r3)
r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00')
sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1020}, 0xc, &(0x7f0000000300)={&(0x7f00000015c0)=ANY=[@ANYBLOB="030002a7", @ANYRES16=r4, @ANYBLOB="050125bd7000ffdbdf2513000000840005000800010069620000240002000800010011000000080001000f000000080002000300000008000400530200001c00020008000300030000000800040017000000080003000000000014000200080001001500000008000200200f0000240002000800030007000000080001000d000000080001001f0000000800020003000000980005003c00020008000200000000000800030005000000080004000400000008000400140c00000800020001000000080003000100000008000200080000000c00020008000200020000004c000200080001000f00000008000400090000000800040002000000080001000f0000000800020020000000080003001be80000080001001c000000080004000000000008000400010000001c0004000c00010073797a30000000000c0007000800040007000000"], 0x14c}, 0x1, 0x0, 0x0, 0x4050}, 0x0)
r5 = socket$rxrpc(0x21, 0x2, 0x400000000000002)
bind$rxrpc(r5, &(0x7f0000000000)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @initdev}}, 0x24)
io_setup(0x8, &(0x7f0000000100)=<r6=>0x0)
fsetxattr$security_capability(r0, &(0x7f0000001740)='security.capability\x00', &(0x7f0000001780)=@v2={0x2000000, [{0xffff, 0x5}, {0x7ff, 0x9}]}, 0x14, 0x3)
open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0)
io_submit(r6, 0x1, &(0x7f0000000600)=[&(0x7f0000000200)={0xfffffffffffffdef, 0x0, 0x0, 0x8, 0x0, r3, 0x0}])
sendmmsg(r2, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0)
ioctl$CAPI_GET_SERIAL(r1, 0xc0044308, &(0x7f00000017c0)=0x9)
accept4(r2, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, <r7=>0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000100)=0x80, 0x80800)
setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r7, 0x84, 0x65, &(0x7f0000000140)=[@in6={0xa, 0x4e22, 0x6, @rand_addr="3d1d56758c20e98e3430deb1f77e99e4", 0x5}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}], 0x2c)
alarm(0x5)

03:45:44 executing program 2:
mq_open(&(0x7f0000000b80)='@', 0x40, 0x10, &(0x7f0000000bc0)={0x6, 0x780, 0x101, 0x8a53, 0x3, 0x8, 0x8, 0x7ff})
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000240)='fou\x00')
sendmsg$FOU_CMD_ADD(r0, &(0x7f00000005c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000080}, 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x38, r1, 0x311, 0x70bd29, 0x25dfdbfe, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x7f}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_PORT={0x8, 0x1, 0x4e20}, @FOU_ATTR_IPPROTO={0x8}]}, 0x38}, 0x1, 0x0, 0x0, 0x4}, 0x4001)
socket$inet_tcp(0x2, 0x3, 0x6)
getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000006c0)={<r2=>0x0}, &(0x7f0000000600)=0xc)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffffffffff6f03, 0x0, @perf_config_ext}, r2, 0x0, 0xffffffffffffffff, 0x0)
r3 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0xffffffffffffff81, 0x240000)
recvmsg$kcm(r3, &(0x7f0000000b40)={&(0x7f0000000640)=@in={0x2, 0x0, @loopback}, 0x80, &(0x7f0000000a40)=[{&(0x7f0000000800)=""/161, 0xa1}, {&(0x7f00000008c0)=""/60, 0x3c}, {&(0x7f0000000900)=""/66, 0x42}, {&(0x7f0000000980)=""/43, 0x2b}, {&(0x7f00000009c0)=""/99, 0x63}], 0x5, &(0x7f0000000ac0)=""/124, 0x7c}, 0x2000)
ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f0000000700)="13091df7b06444efdc41afeaa6afaf423cf5eb10b7777f9be800ef81aa21563148ff3e08656b5ec79179a10403ed92c04363769e621760f8486a2805df3ade6ea2b46d1c73811793c50c18aaeb6b8355be9a69f543d7145ff2b62845deabab43f38a4b413136735bc2f7bfa54af31b49ee3e1b37e3bff918418a256bef581d195bdf6c7e3ab41e7095a049080384d97bdbdb91e7e66bae4762da707f2527bea750e859ae8f5e8b0e8d7f3dceb9ca5bb29dfec1cc4c706a254a3abfbf0c30073cd19fb014d5ad304b4701000f2effd4514320152c10164ffe33c08e90fc3fcd6a3568046b53f773cbd3479570ac3989722c78125db59aad3f03b54661c61e58ca")
ioctl$VIDIOC_G_JPEGCOMP(r3, 0x808c563d, &(0x7f0000000140))
r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00')
sendmsg$TIPC_NL_BEARER_GET(r3, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="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"], 0x110}, 0x1, 0x0, 0x0, 0x80}, 0x40)
r5 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r5, &(0x7f0000000000)={0x18, 0x0, {0x2, @broadcast, 'ip_vti0\x00'}}, 0x1e)
connect$pppoe(r5, &(0x7f0000000080)={0x18, 0x0, {0x3, @remote, 'bond0\x00'}}, 0x1e)
getsockopt$rose(r3, 0x104, 0x7, &(0x7f0000000300), &(0x7f0000000340)=0x4)

[  981.547969]  loop1: p1 < > p4
[  981.563264] loop1: partition table partially beyond EOD, truncated
[  981.608947] loop1: p1 size 2 extends beyond EOD, truncated
[  981.688597] loop1: p4 start 1854537728 is beyond EOD, truncated
03:45:44 executing program 2:
socket$inet_tcp(0x2, 0x3, 0x6)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'bond0\x00'}}, 0x1e)
sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0)

03:45:44 executing program 3:
r0 = getpgid(0x0)
r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2)
perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8)
pipe(&(0x7f00000000c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
r4 = socket$inet_udp(0x2, 0x2, 0x0)
close(r4)
write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
connect(r1, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x4, 0x81, 0x800000000000000, 0x6, @dev={[], 0x1f}}, 0x80)
socket$inet(0x2, 0x3, 0x7f)
r5 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r3, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r2, 0x0, r4, 0x0, 0x10005, 0x0)

[  981.810588] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
03:45:45 executing program 1:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r1, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

03:45:45 executing program 2:
socket$inet_tcp(0x2, 0x3, 0x6)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @broadcast, 'bond0\x00'}}, 0x1e)
sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0)

[  982.127380]  loop1: p1 < > p4
[  982.133755] loop1: partition table partially beyond EOD, truncated
[  982.154776] loop1: p1 size 2 extends beyond EOD, truncated
[  982.205922] loop1: p4 start 1854537728 is beyond EOD, truncated
03:45:45 executing program 0:
r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x840, 0x0)
write$P9_RREAD(r0, &(0x7f0000000240)={0x95, 0x75, 0x1, {0x8a, "83e51cf376cc2ed0a02d9da69ea4575a844cd3371e7fdb1c9eb7dbe846c5e7eae1cf55e8447efbb7c1563b423984c438e6d64466726d340e52a540023a285113e77e5456fdca7a6d49744d8be89727ff3dcbb055361e582e6e04869ded6b9650b0caded818b114c30e13a5687fe693359de44541f17c64192394542051e04943fbc55a937e9cd586e5ed"}}, 0x95)
write$P9_RWSTAT(r0, &(0x7f00000013c0)={0x7, 0x7f, 0x1}, 0x7)
pipe(&(0x7f00000000c0)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = socket$inet_udp(0x2, 0x2, 0x0)
close(r3)
write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r2, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
r5 = add_key$keyring(&(0x7f0000001400)='keyring\x00', &(0x7f0000001440)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
r6 = getuid()
fstat(r4, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, <r7=>0x0})
keyctl$chown(0x4, r5, r6, r7)
connect$inet(r3, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
r8 = add_key(&(0x7f0000000340)='trusted\x00', &(0x7f0000000380)={'syz', 0x0}, &(0x7f00000003c0)="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", 0x1000, 0xfffffffffffffffb)
request_key(&(0x7f0000000080)='syzkaller\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000300)='\x00', r8)
splice(r1, 0x0, r3, 0x0, 0x10005, 0x0)

03:45:45 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0xfffffffffffffffc, 0x1, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1)
r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x0, 0x0)
ioctl$TCSETS(r1, 0x5402, &(0x7f0000000280)={0xfffffffffffff774, 0xfffffffffffffff9, 0x0, 0xfffffffffffffffc, 0xd, 0x9, 0x4, 0x40, 0x2, 0x8, 0x9, 0x1})
connect$pppoe(0xffffffffffffffff, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e)
r2 = syz_open_dev$mice(&(0x7f0000000300)='/dev/input/mice\x00', 0x0, 0x202000)
r3 = openat(r2, &(0x7f00000002c0)='./file0\x00', 0x400, 0x68)
connect$unix(r3, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e)
ioctl$BLKDISCARD(r3, 0x1277, &(0x7f0000000040)=0x5)
ppoll(&(0x7f0000000100)=[{0xffffffffffffffff, 0x141}, {r0, 0x2100}, {0xffffffffffffffff, 0x40}, {r0, 0x8001}, {r0, 0x3640}, {r3, 0x442}, {r0, 0x20}, {0xffffffffffffffff, 0x300}], 0x8, &(0x7f0000000140), &(0x7f0000000180)={0x1}, 0x8)
epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r3, &(0x7f0000000240)={0x2})
sendmmsg(0xffffffffffffffff, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0)
ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000340)={0x8, @tick=0x7, 0x6, {0x6, 0xb8}, 0x1, 0x1, 0x5})

[  982.399428] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
03:45:45 executing program 4:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0h*\x02\x00', @ifru_flags})

03:45:45 executing program 2:
socket$inet_tcp(0x2, 0x3, 0x6)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'bond0\x00'}}, 0x1e)
sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0)
socket$inet_dccp(0x2, 0x6, 0x0)

03:45:45 executing program 1:
syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

03:45:45 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$pppoe(0x18, 0x1, 0x0)
r1 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0xfffffffffffffffa, 0x402)
getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000200)={<r2=>0x0, 0x5cf, 0x8000, 0x10000, 0x79, 0x200}, &(0x7f0000000240)=0x14)
setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f0000000280)={r2, @in6={{0xa, 0x4e22, 0x87f5, @local, 0x5}}}, 0x84)
connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e)
r3 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1f9, 0x80000)
ioctl$KVM_GET_EMULATED_CPUID(r3, 0xc008ae09, &(0x7f0000000100)=""/198)
sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0)

03:45:45 executing program 3:
r0 = getpgid(0x0)
r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2)
perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8)
pipe(&(0x7f00000000c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
r4 = socket$inet_udp(0x2, 0x2, 0x0)
close(r4)
write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
connect(r1, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x4, 0x81, 0x800000000000000, 0x6, @dev={[], 0x1f}}, 0x80)
socket$inet(0x2, 0x3, 0x7f)
r5 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r3, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4)
bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r2, 0x0, r4, 0x0, 0x10005, 0x0)

[  982.942937] IPVS: ftp: loaded support on port[0] = 21
03:45:46 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e)
sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0)
truncate(&(0x7f0000000000)='./file0\x00', 0xe4f)

[  983.048491]  loop1: p1 < > p4
[  983.052028] loop1: partition table partially beyond EOD, truncated
[  983.200670] loop1: p1 size 2 extends beyond EOD, truncated
[  983.296940] loop1: p4 start 1854537728 is beyond EOD, truncated
[  983.579679] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
[  983.580034] print_req_error: 45 callbacks suppressed
[  983.580044] print_req_error: I/O error, dev loop1, sector 0 flags 80700
[  983.644208] print_req_error: I/O error, dev loop1, sector 0 flags 0
[  983.652147] print_req_error: I/O error, dev loop1, sector 0 flags 0
[  983.658937] print_req_error: I/O error, dev loop1, sector 0 flags 0
[  983.680885] print_req_error: I/O error, dev loop1, sector 0 flags 0
[  983.687588] print_req_error: I/O error, dev loop1, sector 0 flags 0
03:45:46 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e)
sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0)
r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='statm\x00')
mkdirat(r1, &(0x7f0000000040)='./file0\x00', 0xd)

03:45:46 executing program 2:
socket$inet_tcp(0x2, 0x3, 0x6)
r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x280000, 0x0)
ioctl$VIDIOC_DBG_G_REGISTER(r0, 0xc0385650, &(0x7f0000000040)={{0x7, @addr=0x7fffffff}, 0x8, 0x7, 0x9})
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r1, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, 'bond0\x00'}}, 0x1e)
sendmmsg(r1, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0)

03:45:46 executing program 3:
r0 = getpgid(0x0)
r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2)
perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8)
pipe(&(0x7f00000000c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
r4 = socket$inet_udp(0x2, 0x2, 0x0)
close(r4)
write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
connect(r1, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x4, 0x81, 0x800000000000000, 0x6, @dev={[], 0x1f}}, 0x80)
socket$inet(0x2, 0x3, 0x7f)
r5 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r3, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r2, 0x0, r4, 0x0, 0x10005, 0x0)

[  983.694513] print_req_error: I/O error, dev loop1, sector 0 flags 0
[  983.701219] print_req_error: I/O error, dev loop1, sector 0 flags 0
[  983.708079] print_req_error: I/O error, dev loop1, sector 0 flags 0
[  983.714858] print_req_error: I/O error, dev loop1, sector 0 flags 0
03:45:46 executing program 0:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r3, 0x0, r0, 0x0, 0x80010002, 0x2)

03:45:46 executing program 1:
syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

03:45:47 executing program 2:
r0 = getpgid(0x0)
r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2)
perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8)
pipe(&(0x7f00000000c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
r4 = socket$inet_udp(0x2, 0x2, 0x0)
close(r4)
write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
connect(r1, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x4, 0x81, 0x800000000000000, 0x6, @dev={[], 0x1f}}, 0x80)
socket$inet(0x2, 0x3, 0x7f)
r5 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r3, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4)
bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r2, 0x0, r4, 0x0, 0x10005, 0x0)

[  984.102707]  loop1: p1 < > p4
[  984.118092] loop1: partition table partially beyond EOD, truncated
[  984.162591] loop1: p1 size 2 extends beyond EOD, truncated
[  984.268974] loop1: p4 start 1854537728 is beyond EOD, truncated
[  984.387370] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
[  984.467521] buffer_io_error: 40 callbacks suppressed
[  984.467532] Buffer I/O error on dev loop1p1, logical block 0, async page read
[  984.483535] Buffer I/O error on dev loop1p1, logical block 0, async page read
[  984.491987] Buffer I/O error on dev loop1p1, logical block 0, async page read
[  984.500905] Buffer I/O error on dev loop1p1, logical block 0, async page read
[  984.509074] Buffer I/O error on dev loop1p1, logical block 0, async page read
[  984.517038] Buffer I/O error on dev loop1p1, logical block 0, async page read
[  984.526252] Buffer I/O error on dev loop1p1, logical block 0, async page read
[  984.534605] Buffer I/O error on dev loop1p1, logical block 0, async page read
[  984.542546] Buffer I/O error on dev loop1p1, logical block 0, async page read
[  984.550945] Buffer I/O error on dev loop1p1, logical block 0, async page read
[  984.614073] net_ratelimit: 21 callbacks suppressed
[  984.614080] protocol 88fb is buggy, dev hsr_slave_0
[  984.624250] protocol 88fb is buggy, dev hsr_slave_1
[  984.629381] protocol 88fb is buggy, dev hsr_slave_0
[  984.634507] protocol 88fb is buggy, dev hsr_slave_1
03:45:48 executing program 4:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0i*\x02\x00', @ifru_flags})

03:45:48 executing program 1:
syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

03:45:48 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r1, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e)
r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x2, 0x480c80)
setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r0, 0x111, 0x4, 0x0, 0x4)
getsockopt$packet_buf(r2, 0x107, 0xf, &(0x7f0000000100)=""/232, &(0x7f0000000040)=0xe8)
sendmmsg(r1, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0)

03:45:48 executing program 3:
r0 = getpgid(0x0)
r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2)
perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8)
pipe(&(0x7f00000000c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
r4 = socket$inet_udp(0x2, 0x2, 0x0)
close(r4)
write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
connect(r1, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x4, 0x81, 0x800000000000000, 0x6, @dev={[], 0x1f}}, 0x80)
socket$inet(0x2, 0x3, 0x7f)
r5 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r3, 0x5414, 0x0)
bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r2, 0x0, r4, 0x0, 0x10005, 0x0)

03:45:48 executing program 0:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r1)
ioctl$SNDRV_TIMER_IOCTL_PAUSE(r0, 0x54a3)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x2, 0xff)
syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000040)=0x8000, 0x4)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
ioctl$PPPIOCSNPMODE(r1, 0x4008744b, &(0x7f0000000100)={0xc027, 0x1})
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000240)=""/163)
r4 = getgid()
getgroups(0x6, &(0x7f0000000080)=[0xee01, 0xffffffffffffffff, 0xee01, <r5=>0x0, 0x0, 0xffffffffffffffff])
setregid(r4, r5)
socket$inet(0x2, 0x5, 0x5)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[  985.013219] IPVS: ftp: loaded support on port[0] = 21
03:45:48 executing program 2:
r0 = getpgid(0x0)
r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2)
perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8)
pipe(&(0x7f00000000c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
r4 = socket$inet_udp(0x2, 0x2, 0x0)
close(r4)
write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
connect(r1, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x4, 0x81, 0x800000000000000, 0x6, @dev={[], 0x1f}}, 0x80)
socket$inet(0x2, 0x3, 0x7f)
r5 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r3, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000040), &(0x7f0000000080)=0x4)
bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r2, 0x0, r4, 0x0, 0x10005, 0x0)

[  985.191527]  loop1: p1 < > p4
[  985.246046] loop1: partition table partially beyond EOD, truncated
03:45:48 executing program 0:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000100)={0x34, 0x0, &(0x7f0000000080)})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
write$P9_RLOPEN(r1, &(0x7f0000000040)={0x18, 0xd, 0x1, {{0x80, 0x1, 0x2}, 0x5bb2}}, 0x18)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[  985.349299] loop1: p1 size 2 extends beyond EOD, truncated
[  985.438712] loop1: p4 start 1854537728 is beyond EOD, truncated
[  985.553048] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
03:45:48 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

[  985.814104] protocol 88fb is buggy, dev hsr_slave_0
[  985.814584] protocol 88fb is buggy, dev hsr_slave_0
[  985.819241] protocol 88fb is buggy, dev hsr_slave_1
[  985.824654] protocol 88fb is buggy, dev hsr_slave_1
[  985.829399] protocol 88fb is buggy, dev hsr_slave_0
[  985.839467] protocol 88fb is buggy, dev hsr_slave_1
03:45:49 executing program 3:
r0 = getpgid(0x0)
r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2)
perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8)
pipe(&(0x7f00000000c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
r4 = socket$inet_udp(0x2, 0x2, 0x0)
close(r4)
write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
connect(r1, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x4, 0x81, 0x800000000000000, 0x6, @dev={[], 0x1f}}, 0x80)
socket$inet(0x2, 0x3, 0x7f)
r5 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r3, 0x5414, 0x0)
bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r2, 0x0, r4, 0x0, 0x10005, 0x0)

03:45:49 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = msgget$private(0x0, 0x10)
msgrcv(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x75, 0x1, 0x3800)
r1 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r1, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0xfffffffffffffff4)
sendmmsg(r1, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0)

03:45:49 executing program 2:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = syz_open_dev$media(&(0x7f0000000180)='/dev/media#\x00', 0x101, 0x840)
ioctl$KVM_S390_UCAS_MAP(r1, 0x4018ae50, &(0x7f00000001c0)={0xfffffffffffffff8, 0xc1, 0x8})
r2 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r2, &(0x7f0000009000)={0x18, 0x0, {0xffffffbfffffffff, @link_local, 'bond0\x00'}}, 0x1e)
recvmmsg(r2, &(0x7f0000008e00)=[{{&(0x7f000000a240)=@caif=@rfm, 0x80, &(0x7f00000025c0)=[{&(0x7f0000000200)=""/33, 0x21}, {&(0x7f0000000240)=""/41, 0x1}, {&(0x7f0000009140)=""/198, 0xc6}, {&(0x7f0000000380)=""/212, 0xd4}, {&(0x7f0000000480)=""/4096, 0x1000}, {&(0x7f0000001480)=""/67, 0x43}, {&(0x7f0000001500)=""/188, 0xbc}, {&(0x7f0000009240)=""/4096, 0x1000}], 0x8, &(0x7f0000002640)=""/47, 0x2f}}, {{&(0x7f0000002680)=@isdn, 0x80, &(0x7f0000002800)=[{&(0x7f0000002700)=""/197, 0xc5}, {&(0x7f0000002a00)=""/4096, 0xfffffffffffffc2e}], 0x2, &(0x7f0000002840)=""/194, 0xc2}, 0x4}, {{&(0x7f0000003a00)=@tipc=@name, 0x80, &(0x7f0000000080)=[{&(0x7f0000002940)=""/10, 0xa}], 0x1, &(0x7f0000003ac0)=""/95, 0x5f}, 0x4}, {{&(0x7f00000090c0)=@hci, 0x80, &(0x7f00000040c0)=[{&(0x7f0000003bc0)=""/18, 0x12}, {&(0x7f0000003c00)=""/153, 0x55}, {&(0x7f0000003cc0)=""/149, 0x95}, {&(0x7f0000003d80)=""/80, 0x50}, {&(0x7f0000003e00)=""/24, 0x18}, {&(0x7f0000003e40)=""/140, 0xffffffffffffff05}, {&(0x7f0000003f00)=""/133, 0x85}, {&(0x7f0000003fc0)=""/245, 0xf5}], 0x8, &(0x7f0000004140)=""/107, 0x6b}, 0xf25b}, {{&(0x7f00000041c0)=@vsock, 0x80, &(0x7f00000064c0)=[{&(0x7f0000004240)=""/250, 0xfa}, {&(0x7f0000004340)=""/4096, 0x1000}, {&(0x7f0000005340)=""/4096, 0x1000}, {&(0x7f0000006340)=""/175, 0xaf}, {&(0x7f0000006400)=""/153, 0x99}], 0x5, &(0x7f0000006540)=""/238, 0xee}, 0x4}, {{&(0x7f0000006640)=@isdn, 0x80, &(0x7f0000006780)=[{&(0x7f00000066c0)=""/148, 0x94}], 0x1, &(0x7f00000067c0)=""/201, 0xc9}, 0x4}, {{&(0x7f0000009040)=@ethernet, 0x80, &(0x7f0000008d40)=[{&(0x7f0000006940)=""/25, 0x19}, {&(0x7f0000006980)=""/47, 0x2f}, {&(0x7f00000069c0)=""/247, 0xf7}, {&(0x7f0000006ac0)=""/4096, 0x1000}, {&(0x7f0000007ac0)=""/235, 0xeb}, {&(0x7f0000007bc0)=""/166, 0xa6}, {&(0x7f0000007c80)=""/88, 0x58}, {&(0x7f0000007d00)=""/39, 0x27}, {&(0x7f0000007d40)=""/4096, 0x1000}], 0x9}, 0x7fff}], 0x7, 0x20, &(0x7f0000008fc0)={0x77359400})
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
close(r3)
r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00')
sendmsg$TIPC_NL_MON_PEER_GET(r1, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1020}, 0xc, &(0x7f0000000300)={&(0x7f00000015c0)=ANY=[@ANYBLOB="030002a7", @ANYRES16=r4, @ANYBLOB="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"], 0x14c}, 0x1, 0x0, 0x0, 0x4050}, 0x0)
r5 = socket$rxrpc(0x21, 0x2, 0x400000000000002)
bind$rxrpc(r5, &(0x7f0000000000)=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @initdev}}, 0x24)
io_setup(0x8, &(0x7f0000000100)=<r6=>0x0)
fsetxattr$security_capability(r0, &(0x7f0000001740)='security.capability\x00', &(0x7f0000001780)=@v2={0x2000000, [{0xffff, 0x5}, {0x7ff, 0x9}]}, 0x14, 0x3)
open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0)
io_submit(r6, 0x1, &(0x7f0000000600)=[&(0x7f0000000200)={0xfffffffffffffdef, 0x0, 0x0, 0x8, 0x0, r3, 0x0}])
sendmmsg(r2, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0)
ioctl$CAPI_GET_SERIAL(r1, 0xc0044308, &(0x7f00000017c0)=0x9)
accept4(r2, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, <r7=>0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000100)=0x80, 0x80800)
setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r7, 0x84, 0x65, &(0x7f0000000140)=[@in6={0xa, 0x4e22, 0x6, @rand_addr="3d1d56758c20e98e3430deb1f77e99e4", 0x5}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}], 0x2c)
alarm(0x5)

03:45:49 executing program 5:
r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x40, 0x0)
getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffff9c, 0x84, 0x1d, &(0x7f0000000140)={0x8, [<r1=>0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000300)=0x1f)
getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f00000001c0)={r1, @in={{0x2, 0x4e24, @rand_addr=0x81}}, [0x65d, 0xa7, 0xfffffffffffffffd, 0x0, 0x1, 0x2, 0x9, 0x80000000, 0x4, 0x8, 0x4863, 0x0, 0x0, 0x2, 0x7]}, &(0x7f00000002c0)=0x100)
r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r3 = socket$inet_sctp(0x2, 0x5, 0x84)
fcntl$getownex(r2, 0x10, &(0x7f0000000000)={0x0, <r4=>0x0})
ioctl$sock_SIOCSPGRP(r3, 0x8902, &(0x7f0000000040)=r4)
r5 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r5, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e)
sendmmsg(r5, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0)

[  986.215295]  loop1: p1 < > p4
[  986.231654] loop1: partition table partially beyond EOD, truncated
[  986.266228] loop1: p1 size 2 extends beyond EOD, truncated
[  986.351941] loop1: p4 start 1854537728 is beyond EOD, truncated
[  986.458742] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
03:45:49 executing program 4:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0j*\x02\x00', @ifru_flags})

03:45:49 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x0, 0x0)
bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={r0, 0x10, &(0x7f0000000040)={&(0x7f0000000100)=""/102, 0x66}}, 0x10)
r1 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r1, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e)
sendmmsg(r1, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0)

03:45:49 executing program 0:
lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340))
getgid()
setgroups(0x400002d5, &(0x7f00000004c0))
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r0)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
fsetxattr$security_evm(r2, &(0x7f0000000040)='security.evm\x00', &(0x7f0000000400)=ANY=[@ANYBLOB="040c09f47e8bad07b284ce0b9dd4897ca4aa6f273a532d"], 0x16, 0x2)
fgetxattr(r3, &(0x7f00000004c0)=@known='security.apparmor\x00', &(0x7f0000000500)=""/231, 0xe7)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r4, 0x84, 0x12, 0x0, 0x0)
openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x80000, 0x0)
getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, &(0x7f0000000100)={<r5=>0x0, 0x5}, &(0x7f0000000240)=0xc)
getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000280)={<r6=>r5}, &(0x7f00000002c0)=0x8)
getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000440)={r6, 0x49, "b791f6601119b1339b7c0bf3f158d4433b174e99e8f30af591540950a4f888791e0ca8d2193e701963973d2bc952170b754acf8392a5f3e44ce5cd43d70de8d098202d785c3c24d047"}, &(0x7f00000003c0)=0x51)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

03:45:49 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

03:45:49 executing program 0:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r1)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
sync_file_range(r2, 0x1, 0x0, 0x7)
bind$inet(r2, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000100)={0x2, 0xfffffffffffffffc, @remote}, 0x2cd)
splice(r1, 0x0, r0, 0x0, 0x10004, 0x3)

[  986.804733] IPVS: ftp: loaded support on port[0] = 21
03:45:49 executing program 3:
r0 = getpgid(0x0)
r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2)
perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8)
pipe(&(0x7f00000000c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
r4 = socket$inet_udp(0x2, 0x2, 0x0)
close(r4)
write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
connect(r1, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x4, 0x81, 0x800000000000000, 0x6, @dev={[], 0x1f}}, 0x80)
socket$inet(0x2, 0x3, 0x7f)
r5 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r3, 0x5414, 0x0)
bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r2, 0x0, r4, 0x0, 0x10005, 0x0)

03:45:49 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e)
r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x80, 0x6b77396a309852db)
getsockopt$rose(r1, 0x104, 0x3, &(0x7f0000000180), &(0x7f00000001c0)=0x4)
sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0)

[  987.022454]  loop1: p1 < > p4
[  987.041134] loop1: partition table partially beyond EOD, truncated
03:45:50 executing program 0:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000080)={<r4=>0x0, 0x4eb0}, &(0x7f0000000100)=0x8)
setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000240)={r4, 0x1, 0x3, [0x80000001, 0x100000000, 0x10000]}, 0xe)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
setsockopt$RXRPC_MIN_SECURITY_LEVEL(r1, 0x110, 0x4, &(0x7f0000000440)=0x1, 0xfffffef6)
setsockopt$RDS_FREE_MR(r1, 0x114, 0x3, &(0x7f0000000300)={{0x2, 0x1}, 0x48}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000280)={r4, 0x20}, &(0x7f00000002c0)=0x8)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
bind$rose(r0, &(0x7f0000000040)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @null, 0x1, @default}, 0x1c)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[  987.080221] loop1: p1 size 2 extends beyond EOD, truncated
03:45:50 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
r3 = socket$inet(0x2, 0x3, 0x7f)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r3, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[  987.187089] loop1: p4 start 1854537728 is beyond EOD, truncated
03:45:50 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$pppoe(0x18, 0x1, 0x0)
r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0x80d, 0x80)
bind$netrom(r1, &(0x7f00000006c0)={{0x3, @bcast}, [@bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48)
connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e)
sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)=[{0x100, 0x115, 0x4da, "1cfe9b10cb45206d00d7887168a7f36b99166e2f074d59c7419e0e414cd00685ffd276c8f5187346f354a62813beacaca14fd783cbdcac7e84d23c94f3761c9ea59ea39d23e09a30ff31c7331b2b5d4a4220370697910b96f8f94a70aaa6ed81a61b27fdb8479f198f9912a566b437a4d0fee85432cb6eccadcbd4b6f3eb4779d0b0b43bf2ac193587a9c3429bd538081c86edb163979b0598de70095f5674819827c87199ae30a27547eaa9dd27e455a5bbeee489a31dcf5e0a50b7140bc434af110ac4dcaaad97ac4167711f31e13c239ffc8e2d91b4261dadce6b2a71d79c194962e54a03ffeb3d39e7a2"}, {0xf0, 0x101, 0x5, "797215a7513dc3b1d4dd426e73155a86388e11a72c4fdde3a6922f45206b4fa7d07396e1207d0e73c5eec4fedbcdd821da174a9a416f1e76234a9bba4e1a3d59387a8a403fdadd96b07cdae39a45adc6f05ba7e7fb6f2a058b98252daf455a97651b380659f500e4f0df39673186a8d4ba9a6f630b743bdea7666510ae5ac25b09f5709b0c45a591aae3d51f6fc275ad69f895f8d701155f5c102b909f58e408ca8efd8783d9277d8988019ff78401e22a3e7dce74fd55695172f9175c75e3dcdafb6818ee3b35f7bdf366969d0a33eb8ec0481ce29a772228be61ad7fd226d2"}, {0x108, 0x109, 0x6, "ae67596c58c8e662d9dcc698f0fe9766c742b66d5c521ea86126f854544a68e7aeab6e78260c372f1dccf3221b5c338338c8ad83c336beb019f4a611704b69e6e70407a3fa9ed32013a8f8493539d5bf819a493689acf8764f60b56bf7479ee0682f96fd2cf7f6aa531d567c4b37208a0eac776657e2f8290b71bcf89db01722893335f9f466c8983da3aa6f00e86c7d064d696e7edf6f1659a8b1afdc7ac0dd7adc2d05c7cd094e5e9b99afcaf25232fabb59eb4b6ef4323b3429eb4e1db304fab3c9b480f31408fc5631a3ae3772c0a9bf0737898f97da2389ed781bead6106d9af6cfa315fd6b730e0d7fa372d9c7bcdcbac968"}, {0xe8, 0x119, 0xb3c, "729da02beb5c5992eec3785e63dfff7b9c19bc03f4cd7e414ae526ee6480308d90b34f1c8df594f04ccfd57c39a00da39d90f81c43db953a6e83082edf90e394438c892e71cd6bf18065c54351888d86e3923535aec4f0cee11322ba0dd5ef09e3809339899736af3702e51f6ba80788f6f005310c7169bffb6e943ffc0bfdcc7d208dc0dd1a863bb39d0bd68056a951ce54a0489c373c2f1fc4277d74ae5a4104293747a0b98761f3ea20ce529d0b78342b4842200683d99edb748c61a2cf0cdd559f99125f50d9222f981654a84b2928620e0f17592f40"}, {0xa0, 0x117, 0xffff, "e05d4a314a879461b4f9923c767d485191ff1ff3dc0f1a5324341dbd9cdc4b7d3e16e2f72d516c00252d3d011f6812f68434b6ea5719729da0dcec68001b939dbee61e0cfc10bfe27b58b6f329a4ec2933f868f0fc083b0b0b73f694743a3a9a2b07d19cde57501d8050074f4542c25eb00059f8ecce09919d254736f5df50ebfd1b119ecd947a042151749d31bf"}, {0x68, 0x107, 0x1, "57b2f66f1611683c8e35b31e89f1738044c67900e4c37f8d347be1c40e5740673ead59724f3e1bbd4ae42768fa6053342ff48b3bb2e3401709e7165ee1686d32063a0f32574039cb5aa1301a26abacebb17b84"}, {0x38, 0x13f, 0x4, "5774d7b096d3ea72af0e0f102d9f637f6f6e4f74a4dafb3670dc75d70c19a38210"}, {0x78, 0x10f, 0x10001, "1878f6c896ec33491d2b563cba1ed93137b4e81d92e9993cb24088bc20d4129d962708531c2d55c14295e988dacd5169238d2074903f3164dcfe0a87de7ee43ab3702f03a2132aa02a30dd671efe7243dfc2e3e3ee4a0d5aece6b04667f47d24c3d20e9c53df"}], 0x598}, 0xfffffffffffffffc}], 0x1, 0x0)

[  987.440268] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
03:45:50 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

03:45:50 executing program 5:
r0 = gettid()
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1000, 0x0, 0x0, 0xc256, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0)
r1 = socket$pppoe(0x18, 0x1, 0x0)
r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x8000, 0x0)
mq_notify(r2, &(0x7f0000000080)={0x0, 0x19, 0x4, @tid=r0})
ioctl$UI_GET_SYSNAME(r1, 0x8040552c, &(0x7f0000000100))
write$P9_RLINK(r2, &(0x7f0000000140)={0x7, 0x47, 0x1}, 0x7)
connect$pppoe(r1, &(0x7f0000000040)={0x18, 0x0, {0x80000000003, @link_local, 'bridge_slave_0\x00'}}, 0x14)
sendmmsg(r1, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0)

[  987.843741]  loop1: p1 < > p4
[  987.856700] loop1: partition table partially beyond EOD, truncated
[  987.878546] loop1: p1 size 2 extends beyond EOD, truncated
[  987.928105] loop1: p4 start 1854537728 is beyond EOD, truncated
[  988.143575] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
03:45:51 executing program 4:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0k*\x02\x00', @ifru_flags})

03:45:51 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x0, 0x4000)
connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x3, @random="e744e0e525de", 'lapb0\x00'}}, 0x1e)
r1 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r1, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e)
sendmmsg(r1, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0)

03:45:51 executing program 3:
r0 = getpgid(0x0)
r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2)
perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8)
pipe(&(0x7f00000000c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
r4 = socket$inet_udp(0x2, 0x2, 0x0)
close(r4)
write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
connect(r1, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x4, 0x81, 0x800000000000000, 0x6, @dev={[], 0x1f}}, 0x80)
socket$inet(0x2, 0x3, 0x7f)
r5 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r2, 0x0, r4, 0x0, 0x10005, 0x0)

03:45:51 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

03:45:51 executing program 0:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000040)={<r4=>0x0, 0x5, 0xa}, &(0x7f0000000080)=0x8)
setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000100)={0x3, 0x4d3f, 0x202, 0x100000001, 0x9, 0x9, 0x20, 0xfb93, r4}, 0x20)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

03:45:51 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
r3 = socket$inet(0x2, 0x3, 0x7f)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r3, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[  988.476543] IPVS: ftp: loaded support on port[0] = 21
[  988.608335]  loop1: p1 < > p4
[  988.642570] loop1: partition table partially beyond EOD, truncated
[  988.728335] loop1: p1 size 2 extends beyond EOD, truncated
[  988.866723] loop1: p4 start 1854537728 is beyond EOD, truncated
[  989.087766] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
[  989.095919] print_req_error: 56 callbacks suppressed
[  989.095931] print_req_error: I/O error, dev loop1, sector 0 flags 80700
[  989.164406] print_req_error: I/O error, dev loop1, sector 0 flags 0
[  989.172050] print_req_error: I/O error, dev loop1, sector 0 flags 0
[  989.178825] print_req_error: I/O error, dev loop1, sector 0 flags 0
[  989.185469] print_req_error: I/O error, dev loop1, sector 0 flags 0
[  989.192059] print_req_error: I/O error, dev loop1, sector 0 flags 0
[  989.199390] print_req_error: I/O error, dev loop1, sector 0 flags 0
[  989.206052] print_req_error: I/O error, dev loop1, sector 0 flags 0
03:45:52 executing program 3:
r0 = getpgid(0x0)
r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2)
perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8)
pipe(&(0x7f00000000c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
r4 = socket$inet_udp(0x2, 0x2, 0x0)
close(r4)
write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
connect(r1, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x4, 0x81, 0x800000000000000, 0x6, @dev={[], 0x1f}}, 0x80)
socket$inet(0x2, 0x3, 0x7f)
r5 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r2, 0x0, r4, 0x0, 0x10005, 0x0)

03:45:52 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

[  989.212623] print_req_error: I/O error, dev loop1, sector 0 flags 0
[  989.219295] print_req_error: I/O error, dev loop1, sector 0 flags 0
03:45:52 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000040)=0x6, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000080), &(0x7f0000000100)=0xb)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
ioctl$CAPI_INSTALLED(r1, 0x80024322)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

03:45:52 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e)
sendmmsg(r0, &(0x7f0000000000), 0x1d8, 0xfffffffffffffffc)
r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x58101, 0x0)
ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f00000000c0)={{0x4, 0x101}, 'port1\x00', 0x80, 0x100040, 0x9, 0xebb, 0x401, 0x1, 0xfffffffffffffffc, 0x0, 0x7})

03:45:52 executing program 4:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0l*\x02\x00', @ifru_flags})

[  989.562212]  loop1: p1 < > p4
03:45:52 executing program 0:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
syz_kvm_setup_cpu$x86(r0, r0, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000100)=[@text16={0x10, &(0x7f0000000040)="0f22590f01c9650f01c866b9800000c00f326635000400000f30ea0b00240166b90d0400000f32baa100ecc782f692080067660f3a0876f1a866b8ceb4fc9d0f23d00f21f86635100000090f23f8", 0x4e}], 0x1, 0x4, &(0x7f0000000240)=[@efer={0x2, 0x2000}], 0x1)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
write$binfmt_misc(r0, &(0x7f0000000280)={'syz1', "14f62638dda710d5905dcebe74d60247e88bda08366dd50df8404c3fe8c6f42eca07369ccdf2738c8beaba1ee7aeb0e0c6369c5a62d5443c5aacfdc0d3ed16efda99bdc8b9c4d79d"}, 0x4c)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[  989.604190] loop1: partition table partially beyond EOD, truncated
[  989.667932] loop1: p1 size 2 extends beyond EOD, truncated
[  989.672366] IPVS: ftp: loaded support on port[0] = 21
[  989.754950] loop1: p4 start 1854537728 is beyond EOD, truncated
03:45:52 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x20000000000, 0xc100)
ioctl$sock_inet6_tcp_SIOCINQ(r0, 0x541b, &(0x7f00000001c0))
r1 = socket$pppoe(0x18, 0x1, 0x0)
r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x400000, 0x0)
ioctl$IOC_PR_RESERVE(r2, 0x401070c9, &(0x7f0000000140)={0xfffffffffffffff7, 0x18, 0x1})
connect$pppoe(r1, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e)
sendmmsg(r1, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0)
r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x0, 0x0)
setsockopt$inet_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4)

[  989.947395] buffer_io_error: 50 callbacks suppressed
[  989.947406] Buffer I/O error on dev loop1p1, logical block 0, async page read
[  989.962716] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
[  989.969443] Buffer I/O error on dev loop1p1, logical block 0, async page read
[  989.976868] net_ratelimit: 18 callbacks suppressed
[  989.976876] protocol 88fb is buggy, dev hsr_slave_0
[  989.976943] protocol 88fb is buggy, dev hsr_slave_1
[  989.977050] protocol 88fb is buggy, dev hsr_slave_0
[  989.977091] protocol 88fb is buggy, dev hsr_slave_1
[  989.984015] protocol 88fb is buggy, dev hsr_slave_0
[  989.988249] Buffer I/O error on dev loop1p1, logical block 0, async page read
[  989.992263] protocol 88fb is buggy, dev hsr_slave_1
[  989.997576] Buffer I/O error on dev loop1p1, logical block 0, async page read
[  990.028472] Buffer I/O error on dev loop1p1, logical block 0, async page read
[  990.036113] Buffer I/O error on dev loop1p1, logical block 0, async page read
03:45:53 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$pppoe(0x18, 0x1, 0x0)
r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x12240, 0x0)
ioctl$NBD_SET_BLKSIZE(r1, 0xab01, 0x200)
connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e)
openat$vhci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhci\x00', 0x80283)
sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0)

03:45:53 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

[  990.043815] Buffer I/O error on dev loop1p1, logical block 0, async page read
[  990.052290] Buffer I/O error on dev loop1p1, logical block 0, async page read
[  990.060257] Buffer I/O error on dev loop1p1, logical block 0, async page read
[  990.068419] Buffer I/O error on dev loop1p1, logical block 0, async page read
03:45:53 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
acct(&(0x7f0000000100)='./file0\x00')
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
r3 = socket$inet(0x2, 0x3, 0x7f)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
ioctl$TCGETS(r0, 0x5401, &(0x7f0000000040))
ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000080)={0x8, 0x8, 0x5, 0x1000100000000, 0x2})
setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
setsockopt$inet6_group_source_req(r1, 0x29, 0x2f, &(0x7f0000000240)={0x5f92, {{0xa, 0x4e24, 0x8, @rand_addr="09fbb15fff2786b21fe924d0d288f2ed", 0x6}}, {{0xa, 0x4e24, 0x4a7, @mcast2, 0x8}}}, 0x108)
close(r3)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)
ioctl$SG_GET_REQUEST_TABLE(r1, 0x2286, &(0x7f0000000380))

03:45:53 executing program 3:
r0 = getpgid(0x0)
r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2)
perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8)
pipe(&(0x7f00000000c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
r4 = socket$inet_udp(0x2, 0x2, 0x0)
close(r4)
write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
connect(r1, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x4, 0x81, 0x800000000000000, 0x6, @dev={[], 0x1f}}, 0x80)
socket$inet(0x2, 0x3, 0x7f)
r5 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r2, 0x0, r4, 0x0, 0x10005, 0x0)

[  990.582060]  loop1: p1 < > p4
[  990.596107] loop1: partition table partially beyond EOD, truncated
[  990.619972] loop1: p1 size 2 extends beyond EOD, truncated
03:45:53 executing program 0:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
unshare(0x10000000)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[  990.700714] loop1: p4 start 1854537728 is beyond EOD, truncated
[  990.774757] protocol 88fb is buggy, dev hsr_slave_0
[  990.780515] protocol 88fb is buggy, dev hsr_slave_1
[  990.856255] protocol 88fb is buggy, dev hsr_slave_0
[  990.861843] protocol 88fb is buggy, dev hsr_slave_1
[  990.881332] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
03:45:54 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

03:45:54 executing program 5:
r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/autofs\x00', 0x80000, 0x0)
r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x400000000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xfffffffffffffffc}, 0x0, 0x6, r0, 0x0)
r2 = socket$pppoe(0x18, 0x1, 0x0)
pipe(&(0x7f00000001c0))
connect$pppoe(r2, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e)
flistxattr(r1, &(0x7f0000000140)=""/102, 0x66)
sendmmsg(r2, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0)
r3 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, &(0x7f0000000040)=0x1c, 0x80800)
setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r3, 0x84, 0x21, &(0x7f0000000100)=0x2b, 0x4)

03:45:54 executing program 4:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0m*\x02\x00', @ifru_flags})

[  991.245188]  loop1: p1 < > p4
03:45:54 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$pppoe(0x18, 0x1, 0x0)
sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0)

03:45:54 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[  991.265488] loop1: partition table partially beyond EOD, truncated
[  991.290079] loop1: p1 size 2 extends beyond EOD, truncated
[  991.305292] IPVS: ftp: loaded support on port[0] = 21
[  991.390159] loop1: p4 start 1854537728 is beyond EOD, truncated
03:45:54 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e)
sendmmsg(r0, &(0x7f0000000300)=[{{&(0x7f0000000000)=@rxrpc=@in6={0x21, 0x2, 0x2, 0x0, {0xa, 0x4e21, 0x4, @empty, 0x9}}, 0x24362f706e5add27, &(0x7f0000000240), 0x1000000000000436, &(0x7f0000000100), 0x23e}, 0x4}], 0x166, 0x0)
r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={'syz', 0x3}, &(0x7f00000001c0)="012fbc8d07e0cdc318884dc144e3f681eb072a5d22e47eeb8df9b62489af962936854a8efece1ca5bab1f2766543f7744bbeb5a57cd35574fb4a9c73b3b48699fdc7c76c3fc7b8c6044075956b9af0e40a9236dffb5c3901bc1d57601af63be83dc39c404b0570aa18215fd0766a4d086ce0d994d736fa943b956ff73ada52ccac937f56a134e3df67b426544a18b90e172b5b7905dfc5ae6bb85908c1096b098110cbd45157b54533af0a12b5a2df2c7fccb19e2088be3a0151300193ef6096e1b2650aeeacfe0d77aed2c1971ec2405f069fd4d1f48878889a0c4e", 0xdc, 0xfffffffffffffffb)
r2 = open(&(0x7f00000003c0)='./file0\x00', 0x20100, 0x2c)
linkat(r2, &(0x7f0000000c40)='./file0\x00', r2, &(0x7f0000000c80)='./file0\x00', 0x1000)
ioctl$VIDIOC_G_ENC_INDEX(r2, 0x8818564c, &(0x7f0000000400))
r3 = add_key(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000340)={'syz', 0x3}, &(0x7f0000000380)="fb4820e03bb6a94d410ec5afa5709ebea88c226b07a32d0a3748f644b120c033128f960ffedba8fcf0f883831e7e6c60392884ead7b212c0", 0x38, 0xfffffffffffffffc)
keyctl$link(0x8, r1, r3)
r4 = syz_open_dev$media(&(0x7f00000000c0)='/dev/media#\x00', 0x2995, 0x100)
ioctl$VIDIOC_SUBDEV_S_CROP(r4, 0xc038563c, &(0x7f0000000100)={0x0, 0x0, {0x8, 0x9, 0xe}})

[  991.574059] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
03:45:54 executing program 3:
r0 = getpgid(0x0)
r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2)
perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8)
pipe(&(0x7f00000000c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
r4 = socket$inet_udp(0x2, 0x2, 0x0)
close(r4)
write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
connect(r1, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x4, 0x81, 0x800000000000000, 0x6, @dev={[], 0x1f}}, 0x80)
socket$inet(0x2, 0x3, 0x7f)
r5 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r2, 0x0, r4, 0x0, 0x10005, 0x0)

03:45:54 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:45:54 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e)
sendmmsg(r0, &(0x7f0000000000), 0x1, 0x0)

03:45:54 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

03:45:55 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:45:55 executing program 0:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="60194cee346887049d47e1d7f84a65280f902827e23ff533d5bae274789a9193d43dc07db8d2ec09f5c624a72a584dfd09cae1066e97bf760dc6d204fe3f793defbc68d369768694844d443fe13274b504f2afd2e60111e8664b91b6", @ANYPTR64, @ANYBLOB="fe9c237ab963026ebc5173cec9e4087775ea01698b40f53b4807fc468c17af5a27d26060cca21af28ee377f76c8d0c34aae907c5950915c3bd9273b749df3239b8ec8d4ab327c85749a5ec90fc7923153592257caaaf5eb95eb5fdf03ed7a20e9b385a99d7b4875e11763ea4573f6338c92b06987ad3ab40ca12cb2385fd6dea47d9052139ec7c78c3f1ff5deb74cd2d7fc11297b8f3953d3fb6413399d96d35689a42b1c5b0f2dcbf372ee14eecf8a77f2a", @ANYRESDEC=0x0, @ANYRESOCT=r0, @ANYRES32=r0, @ANYRES64=0x0, @ANYRES16=r0], 0x14f)
r3 = socket$inet(0x2, 0x3, 0x7f)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000040)=0x1)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

03:45:55 executing program 5:
r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000400)='/proc/capi/capi20\x00', 0x100, 0x0)
ioctl$UI_GET_SYSNAME(r0, 0x8040552c, &(0x7f0000000440))
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r1, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e)
r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x494200, 0x0)
bind$tipc(r2, &(0x7f0000000480)=@id={0x1e, 0x3, 0x3, {0x4e20}}, 0x10)
sendmmsg(r1, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000000)}}], 0x1, 0x0)
r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00')
sendmsg$TIPC_NL_MEDIA_SET(r2, &(0x7f00000003c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000380)={&(0x7f0000000180)={0x1e0, r3, 0x0, 0x70bd2b, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x48, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xfff}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xdf}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}]}, @TIPC_NLA_LINK={0x84, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x23a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8d}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}]}]}, @TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x82f}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_BEARER={0x28, 0x1, [@TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x963}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x401}]}]}, @TIPC_NLA_SOCK={0x24, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0xff}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_BEARER={0x80, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xf219}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x941}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}]}]}, 0x1e0}, 0x1, 0x0, 0x0, 0x40000}, 0x0)

[  992.203454]  loop1: p1 < > p4
[  992.224377] loop1: partition table partially beyond EOD, truncated
[  992.251929] loop1: p1 size 2 extends beyond EOD, truncated
03:45:55 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e)
recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000d80)={&(0x7f0000000bc0)=@pppol2tp={0x18, 0x1, {0x0, <r1=>0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000d40)=[{&(0x7f0000000c40)=""/205, 0xcd}], 0x1}, 0x2000)
accept4$inet6(r1, 0x0, &(0x7f0000000000), 0x800)
setsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000dc0)={0x8, [0xb90, 0x5, 0x3, 0x40, 0x0, 0x81, 0x1fc0000, 0x3]}, 0x14)
sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0)

[  992.327114] loop1: p4 start 1854537728 is beyond EOD, truncated
[  992.503931] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
03:45:55 executing program 4:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0n*\x02\x00', @ifru_flags})

03:45:55 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040))
ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000180))
gettid()
bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, r0, 0x0, 0x5, &(0x7f0000000200)='bdev\x00', 0xffffffffffffffff}, 0x30)
ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000280)=<r1=>0x0)
r2 = syz_open_procfs(r1, &(0x7f00000001c0)='net/rnycast6\x00')
write$FUSE_DIRENT(r2, &(0x7f0000000100)={0x68, 0x0, 0x8, [{0x3, 0x4a50, 0x6, 0x8, 'bond0\x00'}, {0x6, 0x4, 0x6, 0x1f, 'bond0\x00'}, {0x6, 0x6d5, 0x0, 0x9}]}, 0x68)
r3 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r3, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e)
sendmmsg(r3, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0)

03:45:55 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x0)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:45:55 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

03:45:55 executing program 3:
r0 = getpgid(0x0)
r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2)
perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8)
pipe(&(0x7f00000000c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
r4 = socket$inet_udp(0x2, 0x2, 0x0)
close(r4)
write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
connect(r1, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x4, 0x81, 0x800000000000000, 0x6, @dev={[], 0x1f}}, 0x80)
socket$inet(0x2, 0x3, 0x7f)
r5 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r2, 0x0, r4, 0x0, 0x10005, 0x0)

[  992.858481] IPVS: ftp: loaded support on port[0] = 21
03:45:56 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x0)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:45:56 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x20800)
link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00')
fsetxattr$trusted_overlay_opaque(r1, &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x1)
r2 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r2, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x16)
ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x9)
r3 = pkey_alloc(0x0, 0x3)
pkey_mprotect(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2, r3)
r4 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x200080, 0x0)
ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000140)={0x2, 0x60f, 0x8})

[  993.053568]  loop1: p1 < > p4
03:45:56 executing program 0:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000240)=""/250)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
ioctl$VIDIOC_G_SLICED_VBI_CAP(r0, 0xc0745645, &(0x7f0000000040)={0x10001, [0x9e81, 0x8001, 0xfa0b, 0x7, 0x4, 0xffffffffffffffff, 0x1ff, 0x2c5c, 0x0, 0x0, 0x7ff, 0x5, 0x6, 0xd3c, 0x2, 0x160f, 0x1, 0xfffffffffffffffe, 0x10e, 0xfffffffffffffff9, 0x101, 0x5, 0xffff, 0xffff, 0x1000, 0x1, 0x0, 0x80, 0x10000, 0x2c9, 0x4, 0xd500000000000000, 0x6, 0x5, 0x9, 0x7, 0x2d, 0x8001, 0x1, 0x100, 0x3, 0x5, 0x8, 0x6, 0x9bee, 0x7, 0x4, 0x100000001], 0xf})
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[  993.074831] loop1: partition table partially beyond EOD, truncated
[  993.097278] loop1: p1 size 2 extends beyond EOD, truncated
03:45:56 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e)
sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x10ef, &(0x7f0000000100)=[{0xf0, 0x11f, 0xcbd, "3c586a1fff29bc0c1ace0d65c5a5f4f8fa0a8738ae23fd69a2156258cd76ef25b7dde1cbc6a8a3ab59ca158d00711cb77d2b830dd2efe80746e8f48bb2f1a7366c488e1a662c5e352af741c44a92b288c4956a2a7b2b941a0777c753cd298fbd89dafd9558c50c6c2ffa13b49fdab756da18594fa3a5843d76a1d64c864b8c3293a78fcde8e33fe8c2db989040fd3bdb4f79fda87db5df330aafed3751805b234c10657f582f3d2cb4cf308bcf589eebea5059243bc45d52a810d15cb5a15268fd56048a78eddf6f77b813da9f37d227b836e08609f9c823cd0be9bd"}, {0x78, 0x19c, 0x800, "f920104234acf5c8820e47fa05459c91605c8b8de85d78f580ad58e1e607b3dcffc1bc11f749ad5eccb1f0c207eb551c1b3b70c7f0c021db955cf4ce381bea8da0c87fb3cb9e3776d79ad4c7548357b8b8e8fe3b90fed38a605b0145530677a60718e7671c78"}, {0x98, 0x115, 0x9, "a5a078ebf51ce2199d4469e345412cfbf8f4a6845df583d8524be65f36dceae1aba9a2fbdeb4d05676fd16091958e2d9fe1a58b325fbe033a258e258726b8a9b4117bc6828c6e0e13c589406e7fdf1c0878d3af7b2f4da78b83ba159d3ca1eb3e79dc105c272bfb483c0e4386893df107b0b7da8bc417dd2d8cf5598ad77c66135dc0858041adf"}, {0xf0, 0x84, 0x9, "7059a18fafbff4f3647efd82784f99e8fb00d7346b553088d55469627ac643560aadb82ab4e3757f783b86a66e88546bb324fb5d958f761474b17c4555b006f80d229c54188690f56f9fa90cf16ca8e72dbff84c53a2e3e6d59321c3662a02b2714fbc034ef951dbec0054e11e637fbc3fffbfaa52fbf8b5596bd14b64ee0abc55b2063d90e914dd24257c170643abcf115a4d74fb4d1a3ab63417ac08da8844abc037a26cfa6c4d82fa0be9f9025f28c2f3a50aa4cc324d7c31724985d0a0b59282db06fada4fa577a6820f317c18f9384fe0072042b16452"}, {0x78, 0x11e, 0x7, "df7ac999cddd1087ddedd055b2515804f349731179689c3e7bec5f883dce6d485540f52fffd114cbcc2dbd09895d90f30f0be24004c9fd55b1b57c4eb72b8ba78d0a411bd82f79a427d719eb66dc096ecb074b72d67dc6ff944ef8cb23c7fe9b95"}, {0xe8, 0x3a, 0xffffffff, "03f6df78fb688756913d7ccb2fd8c60fe14ecf3a800098ac68e3da1cc8abc69413cddb49ecab72475b995836c826165bbb00bbd0a19ca956810a5c93534f4426d89023cd2e510bef7280194a4f222e396fdada003f998491125008df018b3141fc94bf73336bcef6aeddfb503d007a062fdada0d271dcd33ffc86ca546285746550b6ed023ddf4edeae089c7515e7811edded43efca31a04af391606d609c1e1f750f63015b0d04096e3e629e0bfc7cf6f0a057dffd47c16695cc00fa90688a1a0f936950f3621318794d8fbc8bdee4496c354"}], 0x450}}], 0x1, 0x0)

03:45:56 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x0)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[  993.182517] loop1: p4 start 1854537728 is beyond EOD, truncated
03:45:56 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e)
sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0)
rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00')

03:45:56 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7", 0x4a, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

[  993.464831] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
[  993.873642]  loop1: p1 < > p4
[  993.887949] loop1: partition table partially beyond EOD, truncated
[  993.959192] loop1: p1 size 2 extends beyond EOD, truncated
[  994.021762] loop1: p4 start 1854537728 is beyond EOD, truncated
[  994.192319] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
[  994.192574] print_req_error: 45 callbacks suppressed
[  994.192585] print_req_error: I/O error, dev loop1, sector 0 flags 80700
[  994.219335] print_req_error: I/O error, dev loop1, sector 0 flags 0
[  994.228819] print_req_error: I/O error, dev loop1, sector 0 flags 0
[  994.235542] print_req_error: I/O error, dev loop1, sector 0 flags 0
[  994.242147] print_req_error: I/O error, dev loop1, sector 0 flags 0
[  994.248936] print_req_error: I/O error, dev loop1, sector 0 flags 0
[  994.255600] print_req_error: I/O error, dev loop1, sector 0 flags 0
[  994.262223] print_req_error: I/O error, dev loop1, sector 0 flags 0
[  994.269036] print_req_error: I/O error, dev loop1, sector 0 flags 0
[  994.275732] print_req_error: I/O error, dev loop1, sector 0 flags 0
03:45:57 executing program 4:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0o*\x02\x00', @ifru_flags})

03:45:57 executing program 2:
pipe(&(0x7f0000000640)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f00000003c0)=0xe8)
stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_xfrm(r1, &(0x7f0000000a00)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80410102}, 0xc, &(0x7f00000009c0)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="dc0400001a00100225bd7000fedbdf2500000000000000000000000000000000fe8000000000000000000000000000aa4e24ffe14e2400090a00800033000000", @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="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"], 0x4dc}, 0x1, 0x0, 0x0, 0x20000000}, 0x800)
close(r2)
ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000b80)=@req={0x28, &(0x7f0000000b40)={'veth0\x00', @ifru_addrs=@rc={0x1f, {0x20, 0x6, 0x360, 0x8001, 0x7697, 0x3}, 0x70}}})
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000ac0)={0x0, &(0x7f0000000a80)=[{0x9, 0x8000}, {0x1, 0x81}, {0x5, 0x2}, {0x5, 0x2}, {0x4, 0x8}, {0x4, 0x5}]})
write$P9_ROPEN(r1, &(0x7f0000000040)={0x18, 0x71, 0x1, {{0x2d, 0x4, 0x8}, 0x4}}, 0x18)
r5 = socket$packet(0x11, 0x3, 0x300)
perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xfffffffffffffffa, 0xc9, 0x3ff, 0x0, 0x0, 0x9, 0xa0104, 0x4, 0x4, 0x401, 0x100, 0x1, 0x5, 0x3, 0x2, 0x10001, 0xffffffffffff0001, 0x2, 0x3, 0x8, 0x100400000000000, 0x1, 0x1, 0x0, 0x2, 0x101, 0xffffffffffffffff, 0xff, 0x8, 0x3, 0x9, 0x40000000000000, 0x7f, 0xeb9e, 0x7, 0x8, 0x0, 0x3, 0x4, @perf_bp={&(0x7f0000000080), 0x1}, 0x840, 0x7, 0x2c54, 0x5, 0x6, 0x8, 0x2}, 0x0, 0x10, r1, 0x2)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000600)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x54, 0x2, {"b487804f13d61f07303034639c0ec176d1222a4e8914a4e20f786bd5c35013f4571c88728ccbf207317b8adc17cb77fe0ca0ebd92ae1906a599c"}}, {0x0, "c3b7344953d32e799e1da61ff9b4d162980fbcbfef713c341d403c06fe476884968c793293e5cdd28190415d5e5a605f6c5f546ab28cb310654a05b6b0a433e52b2247ad6638f60d70025a07e14b51fff0c7989de67fcc84229019375315dad2143c9e578dd53dfa54dfad2cf3b22796b2b7294b30ac8ccea60894fc5bc18b966fe938772477156102c08a49b3fa72e4f8f3c0764201e69f509bdaa93a05deebc9fd26896a5444255b8b39af7af3fae84d22120b6e768fecc6fb81bacf4704a29425d92d5315372197ee1fc7fabb"}}, &(0x7f0000001140)=""/4096, 0x124, 0x1000}, 0x20)
setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
fanotify_mark(r1, 0x6, 0x40000000, r5, &(0x7f0000000b00)='./file0/file0\x00')
setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

03:45:57 executing program 0:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$inet_sctp6_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000040)={0xfff}, 0x1)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

03:45:57 executing program 3:
r0 = getpgid(0x0)
r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2)
perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8)
pipe(&(0x7f00000000c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
r4 = socket$inet_udp(0x2, 0x2, 0x0)
close(r4)
write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
connect(r1, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x4, 0x81, 0x800000000000000, 0x6, @dev={[], 0x1f}}, 0x80)
socket$inet(0x2, 0x3, 0x7f)
r5 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r2, 0x0, r4, 0x0, 0x10005, 0x0)

03:45:57 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640)="9c", 0x1, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

03:45:57 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e)
sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0)

[  994.452592] IPVS: ftp: loaded support on port[0] = 21
[  994.640833]  loop1: p1 < > p4
[  994.662086] loop1: partition table partially beyond EOD, truncated
[  994.697314] loop1: p1 size 2 extends beyond EOD, truncated
03:45:57 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r1, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e)
io_setup(0x6, &(0x7f0000000040)=<r2=>0x0)
r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000300)='/dev/dlm_plock\x00', 0x400000, 0x0)
fdatasync(r1)
io_cancel(r2, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x3, 0x5, r0, &(0x7f0000000240)="980d6d8446baf703be19b4bcbcba05ee842d091fd3269fd114d09451e5adf95b49ffba37ba181266f7900afc2d896b3b53cf8b17ddd138c7e51ee05f4e6da22ff3622b82fd523aa1cde02c40e889c21515aa4a3122f948dca546df4abb1a247b0031705edc98d809a40977e1b7269377cb75859a4ed5524c9f41b1561e165e3eda10c9e4e58ba2ec4545cf085c9ae650e878102359538cdf699160d5e2edfc15747543aba5ee5caf6438b3cc4780a2bd9995991a3060b5d2e4", 0xb9, 0xc124, 0x0, 0x0, r3}, &(0x7f0000000380))
sendmmsg(r1, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0)
r4 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x400002, 0x0)
write$UHID_CREATE2(r4, &(0x7f0000000100)={0xb, 'syz1\x00', 'syz0\x00', 'syz1\x00', 0x8, 0xffff, 0xd69, 0x6, 0x4, 0xe1b5, "fd50b24459475148"}, 0x120)

[  994.852466] loop1: p4 start 1854537728 is beyond EOD, truncated
[  995.014077] net_ratelimit: 22 callbacks suppressed
[  995.014084] protocol 88fb is buggy, dev hsr_slave_0
[  995.024353] protocol 88fb is buggy, dev hsr_slave_1
[  995.029463] protocol 88fb is buggy, dev hsr_slave_0
[  995.034577] protocol 88fb is buggy, dev hsr_slave_1
[  995.185504] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
03:45:58 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e)
ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0)
sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f0000000000), 0x16b, &(0x7f0000000100)}}], 0x40000000000013e, 0x0)

03:45:58 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640)="9c", 0x1, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

03:45:58 executing program 2:
pipe(&(0x7f0000000640)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000002c0)={{{@in=@multicast2, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f00000003c0)=0xe8)
stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_xfrm(r1, &(0x7f0000000a00)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80410102}, 0xc, &(0x7f00000009c0)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="dc0400001a00100225bd7000fedbdf2500000000000000000000000000000000fe8000000000000000000000000000aa4e24ffe14e2400090a00800033000000", @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="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"], 0x4dc}, 0x1, 0x0, 0x0, 0x20000000}, 0x800)
close(r2)
ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000b80)=@req={0x28, &(0x7f0000000b40)={'veth0\x00', @ifru_addrs=@rc={0x1f, {0x20, 0x6, 0x360, 0x8001, 0x7697, 0x3}, 0x70}}})
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000ac0)={0x0, &(0x7f0000000a80)=[{0x9, 0x8000}, {0x1, 0x81}, {0x5, 0x2}, {0x5, 0x2}, {0x4, 0x8}, {0x4, 0x5}]})
write$P9_ROPEN(r1, &(0x7f0000000040)={0x18, 0x71, 0x1, {{0x2d, 0x4, 0x8}, 0x4}}, 0x18)
r5 = socket$packet(0x11, 0x3, 0x300)
perf_event_open(&(0x7f0000000240)={0x0, 0x70, 0xfffffffffffffffa, 0xc9, 0x3ff, 0x0, 0x0, 0x9, 0xa0104, 0x4, 0x4, 0x401, 0x100, 0x1, 0x5, 0x3, 0x2, 0x10001, 0xffffffffffff0001, 0x2, 0x3, 0x8, 0x100400000000000, 0x1, 0x1, 0x0, 0x2, 0x101, 0xffffffffffffffff, 0xff, 0x8, 0x3, 0x9, 0x40000000000000, 0x7f, 0xeb9e, 0x7, 0x8, 0x0, 0x3, 0x4, @perf_bp={&(0x7f0000000080), 0x1}, 0x840, 0x7, 0x2c54, 0x5, 0x6, 0x8, 0x2}, 0x0, 0x10, r1, 0x2)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000600)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x54, 0x2, {"b487804f13d61f07303034639c0ec176d1222a4e8914a4e20f786bd5c35013f4571c88728ccbf207317b8adc17cb77fe0ca0ebd92ae1906a599c"}}, {0x0, "c3b7344953d32e799e1da61ff9b4d162980fbcbfef713c341d403c06fe476884968c793293e5cdd28190415d5e5a605f6c5f546ab28cb310654a05b6b0a433e52b2247ad6638f60d70025a07e14b51fff0c7989de67fcc84229019375315dad2143c9e578dd53dfa54dfad2cf3b22796b2b7294b30ac8ccea60894fc5bc18b966fe938772477156102c08a49b3fa72e4f8f3c0764201e69f509bdaa93a05deebc9fd26896a5444255b8b39af7af3fae84d22120b6e768fecc6fb81bacf4704a29425d92d5315372197ee1fc7fabb"}}, &(0x7f0000001140)=""/4096, 0x124, 0x1000}, 0x20)
setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
fanotify_mark(r1, 0x6, 0x40000000, r5, &(0x7f0000000b00)='./file0/file0\x00')
setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

03:45:58 executing program 3:
r0 = getpgid(0x0)
r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2)
perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8)
pipe(&(0x7f00000000c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
r4 = socket$inet_udp(0x2, 0x2, 0x0)
close(r4)
write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
connect(r1, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x4, 0x81, 0x800000000000000, 0x6, @dev={[], 0x1f}}, 0x80)
socket$inet(0x2, 0x3, 0x7f)
r5 = socket$packet(0x11, 0x3, 0x300)
setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r2, 0x0, r4, 0x0, 0x10005, 0x0)

03:45:58 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$pppoe(0x18, 0x1, 0x0)
r1 = dup3(r0, r0, 0x80000)
r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000600)='/dev/mixer\x00', 0x2100, 0x0)
getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x43, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e)
bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10)
connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e)
fchmod(r2, 0x4)
syz_mount_image$bfs(&(0x7f0000000140)='bfs\x00', &(0x7f0000000180)='./file0\x00', 0x5, 0x4, &(0x7f0000000400)=[{&(0x7f00000001c0)="9d63463b92690fa8f02141a7e6aa12a04b0262a226cdf979ac3035f20be0a74617639d233cc7176522c2b581ec6e37901126924c23", 0x35, 0xfff}, {&(0x7f0000000200)="eff2a40568b5c819a09efe0e6853754b73381666546fefc099247c6f8916250596d8cca5ebcee74d8d3ac2b04dee1397e87683e633ab84ab65dc2d8234ab2df6a210de44f700817f1cb6ac05d9a3044214fb03f01ee97b5c0497a81e055cae731591ef4c3212ea0c", 0x68, 0x1f}, {&(0x7f0000000280)="e690e1b0830769a7a1e294dfc692cdc85e59f1cdb624d000c7ea6678010385a43f16a52d043358b6a9d0ba835533e81ca1d91d68fb2fe7e4cb4e839217f8a3d295992e18121f3e7ad07e5182aea9c1672abf3223597c359640b6492637683fbc942e058a74dfb6e969cd2335afb1eae8b430049b6f10aa13b370afef4fa6c89c614b06e8ca2c5b9a3e05f3d686153d53e58a6c6f91065bc97d5e2d70f2dcf195795de0583840dff771d7c5f48734d49ae0db4559b69a71beec5e1e3d694265ed1f9ae2ba95", 0xc5}, {&(0x7f0000000380)="93ce5e53039afee7651be287feb437273e220eadc9a4550f6d861bcdf208f9a41b555a612a5a42ca2fb25f42903994634b2bb7d0b0774034ab220d65c529f7960f1d2c10b2e3a65625c7b20e96fd91f9187a5e1549", 0x55, 0x5}], 0x201010, 0x0)
r3 = getpgrp(0x0)
stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
ioctl$DRM_IOCTL_GET_CLIENT(r2, 0xc0286405, &(0x7f0000000580)={0x3, 0x81, r3, 0x0, r4, 0x0, 0x40, 0xffffffffffffff07})
ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000040))
sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0)

[  995.801898]  loop1: p1 < > p4
[  995.825135] loop1: partition table partially beyond EOD, truncated
[  995.889455] IPVS: ftp: loaded support on port[0] = 21
[  995.933823] loop1: p1 size 2 extends beyond EOD, truncated
[  996.032544] loop1: p4 start 1854537728 is beyond EOD, truncated
03:45:59 executing program 4:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0p*\x02\x00', @ifru_flags})

03:45:59 executing program 0:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$security_evm(r0, &(0x7f0000000040)='security.evm\x00', &(0x7f0000000080)=@v1={0x2, "2a31615a7ab341d252c9c6a12dfb"}, 0xf, 0x90ab6629ff3709b)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

03:45:59 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r1, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e)
ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000140))
r2 = semget(0x3, 0x4, 0x408)
r3 = fcntl$dupfd(r0, 0x406, r1)
ioctl$VT_RELDISP(r3, 0x5605)
setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000100)=r3, 0x4)
semctl$GETNCNT(r2, 0x4, 0xe, &(0x7f0000000000)=""/78)
arch_prctl$ARCH_SET_CPUID(0x1012, 0x1)
sendmmsg(r1, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000100)}}], 0x1, 0x0)

[  996.214045] protocol 88fb is buggy, dev hsr_slave_0
[  996.214080] protocol 88fb is buggy, dev hsr_slave_1
[  996.219144] protocol 88fb is buggy, dev hsr_slave_1
[  996.229355] protocol 88fb is buggy, dev hsr_slave_0
[  996.234470] protocol 88fb is buggy, dev hsr_slave_1
[  996.297768] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
[  996.441021] buffer_io_error: 40 callbacks suppressed
[  996.441031] Buffer I/O error on dev loop1p1, logical block 0, async page read
[  996.447811] IPVS: ftp: loaded support on port[0] = 21
[  996.456180] Buffer I/O error on dev loop1p1, logical block 0, async page read
[  996.466509] Buffer I/O error on dev loop1p1, logical block 0, async page read
[  996.474259] Buffer I/O error on dev loop1p1, logical block 0, async page read
[  996.483107] Buffer I/O error on dev loop1p1, logical block 0, async page read
03:45:59 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640)="9c", 0x1, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

03:45:59 executing program 5:
perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$pppoe(0x18, 0x1, 0x0)
r1 = open(&(0x7f0000000100)='./file0\x00', 0x105100, 0x100)
ioctl$EVIOCGABS20(r1, 0x80184560, &(0x7f0000000140)=""/103)
connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e)
sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0)

03:45:59 executing program 3:
r0 = getpgid(0x0)
r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2)
perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8)
pipe(&(0x7f00000000c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
r4 = socket$inet_udp(0x2, 0x2, 0x0)
close(r4)
write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
connect(r1, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x4, 0x81, 0x800000000000000, 0x6, @dev={[], 0x1f}}, 0x80)
socket$inet(0x2, 0x3, 0x7f)
r5 = socket$packet(0x11, 0x3, 0x300)
setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r2, 0x0, r4, 0x0, 0x10005, 0x0)

[  996.490887] Buffer I/O error on dev loop1p1, logical block 0, async page read
[  996.571732] Buffer I/O error on dev loop1p1, logical block 0, async page read
[  996.580475] Buffer I/O error on dev loop1p1, logical block 0, async page read
[  996.588379] Buffer I/O error on dev loop1p1, logical block 0, async page read
[  996.595962] Buffer I/O error on dev loop1p1, logical block 0, async page read
03:45:59 executing program 2:

[  996.904453]  loop1: p1 < > p4
[  996.926535] loop1: partition table partially beyond EOD, truncated
03:46:00 executing program 2:

[  997.006294] loop1: p1 size 2 extends beyond EOD, truncated
[  997.014863] protocol 88fb is buggy, dev hsr_slave_0
03:46:00 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$pppoe(0x18, 0x1, 0x0)
r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x0, 0x0)
ioctl$SNDRV_CTL_IOCTL_TLV_READ(r1, 0xc008551a, &(0x7f0000000240)={0x1f, 0x4, [0x400000000]})
write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000040)={<r2=>0xffffffffffffffff}, 0x106, 0x5}}, 0x20)
ioctl$TIOCGLCKTRMIOS(r1, 0x5456, &(0x7f0000000200)={0x8001, 0x452f1233, 0x4, 0x1, 0x17, 0x11, 0x9, 0x1f, 0x7ff, 0x6, 0x20, 0xfffffffffffffe00})
write$RDMA_USER_CM_CMD_NOTIFY(r1, &(0x7f0000000140)={0xf, 0x8, 0xfa00, {r2, 0x7}}, 0x10)
ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f0000000180)={0x3, 0x0, [{0x80000007, 0x69fc, 0x4, 0x0, 0x354}, {0x80000001, 0xeb43, 0x1, 0xfffffffffffffffe, 0x3ff}, {0x80000001, 0x839, 0x1, 0x7b, 0x7}]})
connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e)
sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0)

[  997.056164] loop1: p4 start 1854537728 is beyond EOD, truncated
03:46:00 executing program 2:

[  997.199945] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
03:46:00 executing program 5:
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200)
r2 = socket$inet6(0xa, 0x80002, 0x0)
connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c)
r3 = socket$nl_xfrm(0x10, 0x3, 0x6)
sendmsg$nl_xfrm(r3, &(0x7f000014f000)={0x0, 0xff47, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0)
dup2(r0, r2)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socket$pppoe(0x18, 0x1, 0x0)
r4 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xffffffffffff8001, 0xa000)
getsockopt$XDP_STATISTICS(r4, 0x11b, 0x7, &(0x7f0000000040), &(0x7f00000000c0)=0x18)
connect$pppoe(r4, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0xfffffffffffffff1)

03:46:00 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8", 0x26, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

[  997.618879]  loop1: p1 < > p4
[  997.634466] loop1: partition table partially beyond EOD, truncated
[  997.661571] loop1: p1 size 2 extends beyond EOD, truncated
[  997.728505] loop1: p4 start 1854537728 is beyond EOD, truncated
03:46:00 executing program 2:

03:46:00 executing program 0:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
r4 = getpid()
ptrace$poke(0x5, r4, &(0x7f0000000040), 0x42e)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
fstatfs(r0, &(0x7f0000000080)=""/34)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

03:46:00 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x1, @link_local, 'bond0\x00'}}, 0xffffffffffffff84)
sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0)

03:46:00 executing program 4:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0q*\x02\x00', @ifru_flags})

03:46:00 executing program 3:
r0 = getpgid(0x0)
r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2)
perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8)
pipe(&(0x7f00000000c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
r4 = socket$inet_udp(0x2, 0x2, 0x0)
close(r4)
write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
connect(r1, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x4, 0x81, 0x800000000000000, 0x6, @dev={[], 0x1f}}, 0x80)
socket$inet(0x2, 0x3, 0x7f)
r5 = socket$packet(0x11, 0x3, 0x300)
setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r2, 0x0, r4, 0x0, 0x10005, 0x0)

[  997.819776] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
03:46:01 executing program 2:

03:46:01 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640)="9cb7", 0x2, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

03:46:01 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = dup2(r0, r0)
getpeername$packet(r0, &(0x7f0000001080)={0x11, 0x0, <r2=>0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000010c0)=0x14)
bind$can_raw(r1, &(0x7f0000001100)={0x1d, r2}, 0x10)
r3 = socket$pppoe(0x18, 0x1, 0x0)
ioctl$VIDIOC_S_PRIORITY(r1, 0x40045644, 0x3)
write$binfmt_elf64(r0, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x73a)
write$P9_RWALK(r1, &(0x7f0000000000)={0x16, 0x6f, 0x1, {0x1, [{0x80, 0x0, 0x7}]}}, 0x16)
connect$pppoe(r3, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e)
sendmmsg(r3, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0)

[  998.015885] IPVS: ftp: loaded support on port[0] = 21
03:46:01 executing program 2:

03:46:01 executing program 2:

03:46:01 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$pppoe(0x18, 0x1, 0x0)
r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x240400, 0x0)
ioctl$TIOCMGET(r1, 0x5415, &(0x7f0000000040))
ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x400443c9, &(0x7f0000000180)={{0x1, 0x9, 0x0, 0x4, 0x4, 0x3}, 0x3ff})
connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e)
sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0)
syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0xfffffffffffffff8, 0x8400)
ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000100)={0x18, 0x0, {0x4, @remote, 'ip6erspan0\x00'}})

[  998.459237]  loop1: p1 < > p4
[  998.472439] loop1: partition table partially beyond EOD, truncated
03:46:01 executing program 2:

03:46:01 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e)
sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0)
r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20\x00', 0x200001, 0x0)
openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x10000, 0x0)
setsockopt$inet_group_source_req(r1, 0x0, 0x2e, &(0x7f0000000100)={0x6, {{0x2, 0x4e21, @rand_addr=0x56491aaf}}, {{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x108)

[  998.500980] loop1: p1 size 2 extends beyond EOD, truncated
[  998.583588] loop1: p4 start 1854537728 is beyond EOD, truncated
[  998.804437] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
03:46:02 executing program 0:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
r3 = socket$inet(0x2, 0x3, 0x7f)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
ioctl$KVM_REINJECT_CONTROL(r0, 0xae71, &(0x7f0000000240)={0x9})
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x13, &(0x7f0000000040)={<r5=>0x0, 0x1}, &(0x7f0000000080)=0x8)
setsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x1, &(0x7f0000000100)={r5, 0x6d, 0x3, 0x1, 0x36, 0xffff}, 0x14)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

03:46:02 executing program 2:

03:46:02 executing program 4:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0r*\x02\x00', @ifru_flags})

03:46:02 executing program 3:
r0 = getpgid(0x0)
r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2)
perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8)
pipe(&(0x7f00000000c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
r4 = socket$inet_udp(0x2, 0x2, 0x0)
close(r4)
write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
connect(r1, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x4, 0x81, 0x800000000000000, 0x6, @dev={[], 0x1f}}, 0x80)
socket$inet(0x2, 0x3, 0x7f)
setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r2, 0x0, r4, 0x0, 0x10005, 0x0)

03:46:02 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640)="9cb7", 0x2, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

03:46:02 executing program 2:

03:46:02 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0xfffffffffffffc75)
sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0)

[  999.410860] IPVS: ftp: loaded support on port[0] = 21
[  999.456070]  loop1: p1 < > p4
[  999.459552] loop1: partition table partially beyond EOD, truncated
03:46:02 executing program 2:

[  999.500083] loop1: p1 size 2 extends beyond EOD, truncated
[  999.600606] loop1: p4 start 1854537728 is beyond EOD, truncated
03:46:02 executing program 2:

03:46:02 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e)
r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0)
bind$unix(r1, &(0x7f0000000100)=@abs={0x1, 0x0, 0x4e20}, 0x6e)
sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0)

[  999.843525] print_req_error: 45 callbacks suppressed
[  999.843536] print_req_error: I/O error, dev loop1, sector 0 flags 80700
[  999.852251] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
[  999.867925] print_req_error: I/O error, dev loop1, sector 0 flags 0
[  999.878348] print_req_error: I/O error, dev loop1, sector 0 flags 0
[  999.885865] print_req_error: I/O error, dev loop1, sector 0 flags 0
[  999.893117] print_req_error: I/O error, dev loop1, sector 0 flags 0
[  999.901097] print_req_error: I/O error, dev loop1, sector 0 flags 0
[  999.908569] print_req_error: I/O error, dev loop1, sector 0 flags 0
[  999.925547] print_req_error: I/O error, dev loop1, sector 0 flags 0
[  999.932981] print_req_error: I/O error, dev loop1, sector 0 flags 0
03:46:03 executing program 2:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$pppoe(0x18, 0x1, 0x0)
r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x240400, 0x0)
ioctl$TIOCMGET(r1, 0x5415, &(0x7f0000000040))
ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x400443c9, &(0x7f0000000180)={{0x1, 0x9, 0x0, 0x4, 0x4, 0x3}, 0x3ff})
connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e)
sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0)
syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0xfffffffffffffff8, 0x8400)
ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000100)={0x18, 0x0, {0x4, @remote, 'ip6erspan0\x00'}})

03:46:03 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640)="9cb7", 0x2, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

[  999.942384] print_req_error: I/O error, dev loop1, sector 0 flags 0
[ 1000.264804]  loop1: p1 < > p4
[ 1000.286652] loop1: partition table partially beyond EOD, truncated
[ 1000.342305] loop1: p1 size 2 extends beyond EOD, truncated
[ 1000.374046] net_ratelimit: 17 callbacks suppressed
[ 1000.374053] protocol 88fb is buggy, dev hsr_slave_0
[ 1000.379104] protocol 88fb is buggy, dev hsr_slave_1
[ 1000.384605] protocol 88fb is buggy, dev hsr_slave_0
[ 1000.389340] protocol 88fb is buggy, dev hsr_slave_0
[ 1000.394696] protocol 88fb is buggy, dev hsr_slave_1
[ 1000.399387] protocol 88fb is buggy, dev hsr_slave_1
[ 1000.452635] loop1: p4 start 1854537728 is beyond EOD, truncated
03:46:03 executing program 0:
pipe(&(0x7f0000000280)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
r3 = socket$inet(0x2, 0x3, 0x7f)
getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x7, &(0x7f0000000080), &(0x7f00000000c0)=0x4)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
write$FUSE_NOTIFY_RETRIEVE(r0, &(0x7f0000000040)={0x30, 0x5, 0x0, {0x0, 0x4, 0x4}}, 0x30)
setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

03:46:03 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$security_evm(r0, &(0x7f0000000040)='security.evm\x00', &(0x7f0000000080)=@v1={0x2, "2a31615a7ab341d252c9c6a12dfb"}, 0xf, 0x90ab6629ff3709b)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[ 1000.618753] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
03:46:04 executing program 4:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0s*\x02\x00', @ifru_flags})

03:46:04 executing program 3:
r0 = getpgid(0x0)
r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2)
perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8)
pipe(&(0x7f00000000c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
r4 = socket$inet_udp(0x2, 0x2, 0x0)
close(r4)
write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
connect(r1, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x4, 0x81, 0x800000000000000, 0x6, @dev={[], 0x1f}}, 0x80)
socket$inet(0x2, 0x3, 0x7f)
setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r2, 0x0, r4, 0x0, 0x10005, 0x0)

03:46:04 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be", 0x14, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

03:46:04 executing program 5:
r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7f, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r1, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e)
bind$nfc_llcp(r1, &(0x7f0000000240)={0x27, 0x1, 0x0, 0x7, 0x0, 0x8132, "a9b0c1f5e7ad1b3231001aaaf784ef627a8433c0285b45326c9f712a772a8377daab6712604eec93ef30b7658d999abbb68d48802460c0d0d4d88d0f4c21ad", 0x1b}, 0x60)
r2 = dup2(r0, r1)
getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f00000003c0)={<r3=>0x0, @in={{0x2, 0x4e23, @rand_addr=0x9}}, [0x9, 0x5, 0x8, 0x8, 0x0, 0x80000000, 0x5, 0x6, 0xfc5, 0x2, 0x7352985d, 0x4, 0x2, 0x40f, 0x101]}, &(0x7f0000000000)=0x100)
setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f00000004c0)=[@in={0x2, 0x4e23, @local}, @in6={0xa, 0x4e24, 0x3ff, @loopback, 0x5}, @in={0x2, 0x4e22, @broadcast}, @in={0x2, 0x4e24, @empty}, @in6={0xa, 0x4e20, 0x4d, @loopback, 0x100000001}, @in6={0xa, 0x4e21, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x2}, @in={0x2, 0x4e24, @empty}, @in={0x2, 0x4e20, @multicast1}, @in={0x2, 0x4e20, @remote}], 0xb4)
getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000100)={<r4=>r3, 0x8}, &(0x7f0000000140)=0x8)
setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f0000000180)={r4, @in6={{0xa, 0x4e20, 0x68fd, @local, 0x9}}, 0x6, 0x4, 0x5, 0x0, 0x1}, 0x98)
ioctl$KVM_PPC_GET_SMMU_INFO(r2, 0x8250aea6, &(0x7f0000000300)=""/189)
syz_open_dev$sndpcmp(&(0x7f00000002c0)='/dev/snd/pcmC#D#p\x00', 0x4, 0x88000)
sendmmsg(r1, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0)

03:46:04 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$pppoe(0x18, 0x1, 0x0)
r1 = dup3(r0, r0, 0x80000)
r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000600)='/dev/mixer\x00', 0x2100, 0x0)
getsockopt$IPT_SO_GET_REVISION_TARGET(r2, 0x0, 0x43, &(0x7f0000000480)={'icmp6\x00'}, &(0x7f00000004c0)=0x1e)
bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x19}}, 0x10)
connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e)
fchmod(r2, 0x4)
syz_mount_image$bfs(&(0x7f0000000140)='bfs\x00', &(0x7f0000000180)='./file0\x00', 0x5, 0x4, &(0x7f0000000400)=[{&(0x7f00000001c0)="9d63463b92690fa8f02141a7e6aa12a04b0262a226cdf979ac3035f20be0a74617639d233cc7176522c2b581ec6e37901126924c23", 0x35, 0xfff}, {&(0x7f0000000200)="eff2a40568b5c819a09efe0e6853754b73381666546fefc099247c6f8916250596d8cca5ebcee74d8d3ac2b04dee1397e87683e633ab84ab65dc2d8234ab2df6a210de44f700817f1cb6ac05d9a3044214fb03f01ee97b5c0497a81e055cae731591ef4c3212ea0c", 0x68, 0x1f}, {&(0x7f0000000280)="e690e1b0830769a7a1e294dfc692cdc85e59f1cdb624d000c7ea6678010385a43f16a52d043358b6a9d0ba835533e81ca1d91d68fb2fe7e4cb4e839217f8a3d295992e18121f3e7ad07e5182aea9c1672abf3223597c359640b6492637683fbc942e058a74dfb6e969cd2335afb1eae8b430049b6f10aa13b370afef4fa6c89c614b06e8ca2c5b9a3e05f3d686153d53e58a6c6f91065bc97d5e2d70f2dcf195795de0583840dff771d7c5f48734d49ae0db4559b69a71beec5e1e3d694265ed1f9ae2ba95", 0xc5}, {&(0x7f0000000380)="93ce5e53039afee7651be287feb437273e220eadc9a4550f6d861bcdf208f9a41b555a612a5a42ca2fb25f42903994634b2bb7d0b0774034ab220d65c529f7960f1d2c10b2e3a65625c7b20e96fd91f9187a5e1549", 0x55, 0x5}], 0x201010, 0x0)
r3 = getpgrp(0x0)
stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
ioctl$DRM_IOCTL_GET_CLIENT(r2, 0xc0286405, &(0x7f0000000580)={0x3, 0x81, r3, 0x0, r4, 0x0, 0x40, 0xffffffffffffff07})
ioctl$sock_inet6_udp_SIOCINQ(r2, 0x541b, &(0x7f0000000040))
sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f00000003c0), 0x0, &(0x7f0000000100)}}], 0x1b3, 0x0)

[ 1001.143049] IPVS: ftp: loaded support on port[0] = 21
[ 1001.174047] protocol 88fb is buggy, dev hsr_slave_0
[ 1001.179229] protocol 88fb is buggy, dev hsr_slave_1
[ 1001.254052] protocol 88fb is buggy, dev hsr_slave_0
[ 1001.259239] protocol 88fb is buggy, dev hsr_slave_1
[ 1001.299510]  loop1: p1 < > p4
[ 1001.312645] loop1: partition table partially beyond EOD, truncated
[ 1001.340873] loop1: p1 size 2 extends beyond EOD, truncated
03:46:04 executing program 5:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$pppoe(0x18, 0x1, 0x0)
connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x3, @link_local, 'bond0\x00'}}, 0x1e)
ioctl$PPPOEIOCDFWD(r0, 0xb101, 0x0)
sendmmsg(r0, &(0x7f00000000c0)=[{{&(0x7f0000002980)=@rc={0x1f, {0xe}}, 0x80, &(0x7f0000000000), 0x16b, &(0x7f0000000100)}}], 0x40000000000013e, 0x0)

[ 1001.473598] loop1: p4 start 1854537728 is beyond EOD, truncated
03:46:04 executing program 5:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0X*\x02\x00', @ifru_flags})

[ 1001.714921] buffer_io_error: 50 callbacks suppressed
[ 1001.714931] Buffer I/O error on dev loop1p1, logical block 0, async page read
[ 1001.728044] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
[ 1001.736338] Buffer I/O error on dev loop1p1, logical block 0, async page read
[ 1001.743836] Buffer I/O error on dev loop1p1, logical block 0, async page read
[ 1001.751546] Buffer I/O error on dev loop1p1, logical block 0, async page read
03:46:04 executing program 0:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000240)={0x2, {{0x2, 0x4e23, @multicast2}}, 0x1, 0x3, [{{0x2, 0x4e20, @broadcast}}, {{0x2, 0x4e20, @local}}, {{0x2, 0x4e21, @rand_addr=0x7}}]}, 0x210)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

03:46:04 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640)="9cb7", 0x2, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

[ 1001.759070] Buffer I/O error on dev loop1p1, logical block 0, async page read
[ 1001.766595] Buffer I/O error on dev loop1p1, logical block 0, async page read
[ 1001.774122] Buffer I/O error on dev loop1p1, logical block 0, async page read
[ 1001.786531] Buffer I/O error on dev loop1p1, logical block 0, async page read
[ 1001.795079] Buffer I/O error on dev loop1p1, logical block 0, async page read
[ 1001.803236] Buffer I/O error on dev loop1p1, logical block 0, async page read
03:46:04 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$security_evm(r0, &(0x7f0000000040)='security.evm\x00', &(0x7f0000000080)=@v1={0x2, "2a31615a7ab341d252c9c6a12dfb"}, 0xf, 0x90ab6629ff3709b)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[ 1001.861259] IPVS: ftp: loaded support on port[0] = 21
03:46:05 executing program 3:
r0 = getpgid(0x0)
r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2)
perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8)
pipe(&(0x7f00000000c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
r4 = socket$inet_udp(0x2, 0x2, 0x0)
close(r4)
write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
connect(r1, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x4, 0x81, 0x800000000000000, 0x6, @dev={[], 0x1f}}, 0x80)
socket$inet(0x2, 0x3, 0x7f)
setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r2, 0x0, r4, 0x0, 0x10005, 0x0)

[ 1002.391810]  loop1: p1 < > p4
[ 1002.462594] loop1: partition table partially beyond EOD, truncated
[ 1002.529718] loop1: p1 size 2 extends beyond EOD, truncated
03:46:05 executing program 4:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0t*\x02\x00', @ifru_flags})

[ 1002.610841] loop1: p4 start 1854537728 is beyond EOD, truncated
[ 1002.738992] IPVS: ftp: loaded support on port[0] = 21
[ 1002.758841] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
03:46:05 executing program 0:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
connect$bt_l2cap(r1, &(0x7f00000002c0)={0x1f, 0x4, {0x7fff, 0xffffffff, 0x5, 0x3, 0x101, 0x4}, 0x6, 0xfffffffffffffc01}, 0xe)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000100)=@req={0xff, 0x3, 0x3, 0x2}, 0x10)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
socket$packet(0x11, 0x3, 0x300)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)
clock_gettime(0x0, &(0x7f0000000040)={<r4=>0x0, <r5=>0x0})
ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000240)={0xffffffff, 0xf, 0x4, 0x30000, {r4, r5/1000+10000}, {0x4, 0xd, 0x8, 0x7, 0x10000, 0x8, "12058d5a"}, 0x3, 0x1f8de5fc2e988418, @planes=&(0x7f0000000080)={0x7fffffff, 0x6, @mem_offset=0x6, 0x2}, 0x4})
fadvise64(r2, 0x0, 0x200, 0x7)

03:46:05 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640)="9cb7", 0x2, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

03:46:06 executing program 3:
r0 = getpgid(0x0)
r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2)
perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8)
pipe(&(0x7f00000000c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
r4 = socket$inet_udp(0x2, 0x2, 0x0)
close(r4)
write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
connect(r1, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x4, 0x81, 0x800000000000000, 0x6, @dev={[], 0x1f}}, 0x80)
r5 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r2, 0x0, r4, 0x0, 0x10005, 0x0)

[ 1003.321806]  loop1: p1 < > p4
03:46:06 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1003.358761] loop1: partition table partially beyond EOD, truncated
[ 1003.430761] loop1: p1 size 2 extends beyond EOD, truncated
[ 1003.549077] loop1: p4 start 1854537728 is beyond EOD, truncated
03:46:06 executing program 5:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, 0x0)
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:46:06 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1003.757783] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
03:46:06 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640)="9cb7", 0x2, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

[ 1003.838664] hfs: can't find a HFS filesystem on dev loop5
[ 1004.033754]  loop5: p1 < > p4
03:46:07 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:46:07 executing program 0:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
r3 = socket$inet(0x2, 0x3, 0x7f)
r4 = socket$packet(0x11, 0x5, 0x300)
setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
sendmsg$rds(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000040)=""/73, 0x49}, {&(0x7f0000000240)=""/169, 0xa9}, {&(0x7f0000000100)=""/32, 0x20}, {&(0x7f0000000300)=""/37, 0x25}, {&(0x7f0000000340)=""/89, 0x59}, {&(0x7f00000003c0)=""/166, 0xa6}], 0x6, &(0x7f0000000740)=ANY=[@ANYBLOB="5800000000000000140100000900000008000000000000002a9218837de3e9215035524260b67f9ce5602f4fb6c8eb9012aa6283fd27c1ad4ff90757b39af26eb38a1ee2e7010000803eb5b080547560661bb3a2ae2ff61207bc46b4ccb5414520674b9d5cc87d6025d95e683f7795d204a353f49244c8067d7a723662bf2a9112c0cfc1493f358704dd56333673aa3a88c1590c93be63ab125b73c804a7c22a7115e85075a13f2fdda0c910e3be0a0ab60e7805c761331c8cf92319d4e05bb753048dff8b9973baa8e0512758fd1cc80e437acacdf6538980875f39aa3b3f52246a0cd1fb4c63eccc4955e7a9bd80d5f639d1282d8daa837b75c55fc7fd4d1242d773063a5742497d18d4b136777b70dfa308785cba19b3b3f93db255217d1a0dbb54d2dd2dc541cb209cb97cc2e24fb86cf7d07473c7aed8aca09d820747624862f759883ac34a8d88ba", @ANYPTR=&(0x7f0000000680)=ANY=[@ANYBLOB="fe93476808000028b4358b07024f2c126663871c2a1f46904ae7ff224938a9da9905fe6f03b495f04d0f675718beb17ce0b149118b304ea7f4417d114ac18b"], @ANYPTR=&(0x7f0000000540)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="f7ffffffffffffff8dcd0000000000000600000000000000090000000000000032000000000000000400000000000000"], 0x58, 0x8011}, 0x8800)
setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000500)={0xff}, 0x1)
syz_init_net_socket$netrom(0x6, 0x5, 0x0)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)
ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000640)=0xeedc)

[ 1004.071006] loop5: partition table partially beyond EOD, truncated
03:46:07 executing program 3:
r0 = getpgid(0x0)
r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2)
perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8)
pipe(&(0x7f00000000c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
r4 = socket$inet_udp(0x2, 0x2, 0x0)
close(r4)
write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
connect(r1, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x4, 0x81, 0x800000000000000, 0x6, @dev={[], 0x1f}}, 0x80)
r5 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r2, 0x0, r4, 0x0, 0x10005, 0x0)

[ 1004.131998] loop5: p1 size 2 extends beyond EOD, truncated
03:46:07 executing program 4:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0u*\x02\x00', @ifru_flags})

[ 1004.210866]  loop1: p1 < > p4
[ 1004.223510] loop1: partition table partially beyond EOD, truncated
[ 1004.245079] loop5: p4 start 1854537728 is beyond EOD, truncated
[ 1004.301401] loop1: p1 size 2 extends beyond EOD, truncated
03:46:07 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1004.383451] IPVS: ftp: loaded support on port[0] = 21
[ 1004.399616] loop1: p4 start 1854537728 is beyond EOD, truncated
[ 1004.441779] __loop_clr_fd: partition scan of loop5 failed (rc=-22)
[ 1004.615248] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
03:46:07 executing program 5:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c000", 0x5d, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:46:07 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c000", 0x5d, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:46:07 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f", 0xb, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

[ 1004.817917] hfs: can't find a HFS filesystem on dev loop5
03:46:08 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c000", 0x5d, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1005.107684] Dev loop5: unable to read RDB block 1
[ 1005.111250]  loop1: p1 < > p4
[ 1005.143606] loop1: partition table partially beyond EOD, truncated
[ 1005.154959]  loop5: unable to read partition table
[ 1005.161543] loop5: partition table beyond EOD, truncated
[ 1005.183672] loop_reread_partitions: partition scan of loop5 () failed (rc=-5)
03:46:08 executing program 3:
r0 = getpgid(0x0)
r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2)
perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8)
pipe(&(0x7f00000000c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
r4 = socket$inet_udp(0x2, 0x2, 0x0)
close(r4)
write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
connect(r1, &(0x7f00000002c0)=@llc={0x1a, 0x0, 0x4, 0x81, 0x800000000000000, 0x6, @dev={[], 0x1f}}, 0x80)
r5 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r2, 0x0, r4, 0x0, 0x10005, 0x0)

[ 1005.212228] loop1: p1 size 2 extends beyond EOD, truncated
[ 1005.291355] loop1: p4 start 1854537728 is beyond EOD, truncated
[ 1005.322843] __loop_clr_fd: partition scan of loop5 failed (rc=-22)
03:46:08 executing program 0:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="9a5b0ef0eb4152ba6ef6f5ef70a6cd093c3d79ca9df20a6bff78e538f9434424b2776ab6c4e75459d04c307ad6bc6e44aebe3ff89a79f86ea13179d61530c45f4effe8f9ac5aee27a88638f41f3fe084478e0614c6846e6e2ea9bc227b872b319d00cb2665aaddaa57835993064c239907af7112a93d188955cdf5a92cbeca5a2819d4694cb301f1ef60df830e239787aac353311dfbe27a50d7195c7c50c6b71a376639fc507d6852d953f4d45456876806d1fafffab4afe12f8d47d874c458a784e284d3bd22f9ca4c49ba3e3ff44158e44e80e8bb61467238961dc22175e424b17835d27b2f7ce3b761755a2d1107", @ANYRES16=r0, @ANYRESOCT=r1, @ANYRES32=r2, @ANYRESDEC=r0], 0x4240a42f)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000040)={<r4=>0x0, 0x5}, &(0x7f0000000080)=0x8)
setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000100)={0xe6, 0x200, 0xb07, 0x2, r4}, 0x10)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r0, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

03:46:08 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c000", 0x5d, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:46:08 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
r3 = socket$inet(0x2, 0x3, 0x7f)
r4 = socket$packet(0x11, 0x5, 0x300)
setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
sendmsg$rds(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000040)=""/73, 0x49}, {&(0x7f0000000240)=""/169, 0xa9}, {&(0x7f0000000100)=""/32, 0x20}, {&(0x7f0000000300)=""/37, 0x25}, {&(0x7f0000000340)=""/89, 0x59}, {&(0x7f00000003c0)=""/166, 0xa6}], 0x6, &(0x7f0000000740)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f0000000680)=ANY=[@ANYBLOB="fe93476808000028b4358b07024f2c126663871c2a1f46904ae7ff224938a9da9905fe6f03b495f04d0f675718beb17ce0b149118b304ea7f4417d114ac18b"], @ANYPTR=&(0x7f0000000540)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="f7ffffffffffffff8dcd0000000000000600000000000000090000000000000032000000000000000400000000000000"], 0x58, 0x8011}, 0x8800)
setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x15, &(0x7f0000000500)={0xff}, 0x1)
syz_init_net_socket$netrom(0x6, 0x5, 0x0)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)
ioctl$TUNSETVNETLE(r1, 0x400454dc, &(0x7f0000000640)=0xeedc)

[ 1005.639932] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
03:46:08 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f", 0xb, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

03:46:09 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c000", 0x5d, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1006.043695]  loop1: p1 < > p4
[ 1006.066483] loop1: partition table partially beyond EOD, truncated
[ 1006.089917] loop1: p1 size 2 extends beyond EOD, truncated
[ 1006.198677] loop1: p4 start 1854537728 is beyond EOD, truncated
[ 1006.342920] print_req_error: 56 callbacks suppressed
[ 1006.342931] print_req_error: I/O error, dev loop1, sector 0 flags 80700
[ 1006.348289] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
[ 1006.361718] print_req_error: I/O error, dev loop1, sector 0 flags 0
[ 1006.368341] print_req_error: I/O error, dev loop1, sector 0 flags 0
[ 1006.375743] print_req_error: I/O error, dev loop1, sector 0 flags 0
[ 1006.382284] print_req_error: I/O error, dev loop1, sector 0 flags 0
[ 1006.388861] print_req_error: I/O error, dev loop1, sector 0 flags 0
[ 1006.410640] print_req_error: I/O error, dev loop1, sector 0 flags 0
[ 1006.417747] print_req_error: I/O error, dev loop1, sector 0 flags 0
[ 1006.425764] print_req_error: I/O error, dev loop1, sector 0 flags 0
[ 1006.432844] print_req_error: I/O error, dev loop1, sector 0 flags 0
03:46:09 executing program 4:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0v*\x02\x00', @ifru_flags})

03:46:09 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c000", 0x5d, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:46:09 executing program 3:
r0 = getpgid(0x0)
r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2)
perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8)
pipe(&(0x7f00000000c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
r4 = socket$inet_udp(0x2, 0x2, 0x0)
close(r4)
write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r5 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r2, 0x0, r4, 0x0, 0x10005, 0x0)

03:46:09 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640)="9cb7", 0x2, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

03:46:09 executing program 5:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e", 0x5a, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:46:09 executing program 0:
pipe(&(0x7f0000000380)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
r3 = socket$inet(0x2, 0x3, 0x7f)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={<r5=>0x0, 0x3, 0x2, [0xffffffffffffff80, 0x7f]}, &(0x7f0000000080)=0xc)
getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x1f, &(0x7f0000000240)={r5, @in={{0x2, 0x4e21, @local}}, 0x6, 0x2}, &(0x7f00000000c0)=0x90)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[ 1006.704490] hfs: can't find a HFS filesystem on dev loop5
[ 1006.789362] IPVS: ftp: loaded support on port[0] = 21
03:46:09 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c000", 0x5d, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1006.931260]  loop1: p1 < > p4
[ 1006.939033] Dev loop5: unable to read RDB block 1
[ 1006.946155] loop1: partition table partially beyond EOD, truncated
[ 1006.960179]  loop5: unable to read partition table
[ 1006.976563] loop5: partition table beyond EOD, truncated
[ 1006.982928] loop_reread_partitions: partition scan of loop5 () failed (rc=-5)
[ 1007.012011] loop1: p1 size 2 extends beyond EOD, truncated
[ 1007.112475] loop1: p4 start 1854537728 is beyond EOD, truncated
[ 1007.262374] __loop_clr_fd: partition scan of loop5 failed (rc=-22)
03:46:10 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e", 0x5a, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:46:10 executing program 5:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x54, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1007.375585] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
[ 1007.414061] net_ratelimit: 20 callbacks suppressed
[ 1007.414069] protocol 88fb is buggy, dev hsr_slave_0
[ 1007.424228] protocol 88fb is buggy, dev hsr_slave_1
[ 1007.494536] protocol 88fb is buggy, dev hsr_slave_0
[ 1007.499719] protocol 88fb is buggy, dev hsr_slave_1
[ 1007.504894] protocol 88fb is buggy, dev hsr_slave_0
[ 1007.509959] protocol 88fb is buggy, dev hsr_slave_1
03:46:10 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640)="9cb7", 0x2, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

03:46:10 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x4000000000000000)

03:46:10 executing program 3:
r0 = getpgid(0x0)
r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2)
perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8)
pipe(&(0x7f00000000c0)={<r2=>0xffffffffffffffff})
r3 = socket$inet_udp(0x2, 0x2, 0x0)
close(r3)
socket$inet(0x2, 0x3, 0x7f)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r3, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r2, 0x0, r3, 0x0, 0x10005, 0x0)

[ 1007.880315]  loop1: p1 < > p4
[ 1007.895009] loop1: partition table partially beyond EOD, truncated
[ 1007.937004] loop1: p1 size 2 extends beyond EOD, truncated
[ 1007.997149] loop1: p4 start 1854537728 is beyond EOD, truncated
[ 1008.180914] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
[ 1008.183909] buffer_io_error: 40 callbacks suppressed
[ 1008.183919] Buffer I/O error on dev loop1p1, logical block 0, async page read
[ 1008.201049] Buffer I/O error on dev loop1p1, logical block 0, async page read
[ 1008.210138] Buffer I/O error on dev loop1p1, logical block 0, async page read
[ 1008.218378] Buffer I/O error on dev loop1p1, logical block 0, async page read
[ 1008.226259] Buffer I/O error on dev loop1p1, logical block 0, async page read
[ 1008.235170] Buffer I/O error on dev loop1p1, logical block 0, async page read
[ 1008.244157] Buffer I/O error on dev loop1p1, logical block 0, async page read
[ 1008.253021] Buffer I/O error on dev loop1p1, logical block 0, async page read
[ 1008.261684] Buffer I/O error on dev loop1p1, logical block 0, async page read
[ 1008.269172] Buffer I/O error on dev loop1p1, logical block 0, async page read
03:46:11 executing program 4:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0w*\x02\x00', @ifru_flags})

03:46:11 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x900000000000000)

03:46:11 executing program 0:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
ioctl$EVIOCGBITSND(r1, 0x80404532, &(0x7f0000000080))
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r0, 0x0, 0x10002, 0x800000000000)
syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x4001)

03:46:11 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640)="9cb7", 0x2, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

[ 1008.456126] IPVS: ftp: loaded support on port[0] = 21
[ 1008.543890]  loop1: p1 < > p4
[ 1008.551917] loop1: partition table partially beyond EOD, truncated
[ 1008.571928] loop1: p1 size 2 extends beyond EOD, truncated
[ 1008.622265] loop1: p4 start 1854537728 is beyond EOD, truncated
[ 1008.694033] protocol 88fb is buggy, dev hsr_slave_0
[ 1008.694427] protocol 88fb is buggy, dev hsr_slave_0
[ 1008.699145] protocol 88fb is buggy, dev hsr_slave_1
[ 1008.704522] protocol 88fb is buggy, dev hsr_slave_1
03:46:11 executing program 3:
r0 = getpgid(0x0)
r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2)
perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8)
pipe(&(0x7f00000000c0)={<r2=>0xffffffffffffffff})
r3 = socket$inet_udp(0x2, 0x2, 0x0)
close(r3)
socket$inet(0x2, 0x3, 0x7f)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r3, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r2, 0x0, r3, 0x0, 0x10005, 0x0)

[ 1008.893709] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
03:46:12 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

03:46:12 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x4000000000000000)

03:46:12 executing program 5:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r1, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r2 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, 0x0)
r3 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r3, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r2, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r4 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r4, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:46:12 executing program 0:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000040)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[ 1009.366025]  loop1: p1 < > p4
[ 1009.407451] loop1: partition table partially beyond EOD, truncated
[ 1009.448577] hfs: can't find a HFS filesystem on dev loop5
[ 1009.485077] loop1: p1 size 2 extends beyond EOD, truncated
[ 1009.531119] loop1: p4 start 1854537728 is beyond EOD, truncated
03:46:12 executing program 4:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0x*\x02\x00', @ifru_flags})

[ 1009.726772]  loop5: p1 < > p4
03:46:12 executing program 3:
r0 = getpgid(0x0)
r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2)
perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8)
pipe(&(0x7f00000000c0)={<r2=>0xffffffffffffffff})
r3 = socket$inet_udp(0x2, 0x2, 0x0)
close(r3)
socket$inet(0x2, 0x3, 0x7f)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r3, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r2, 0x0, r3, 0x0, 0x10005, 0x0)

[ 1009.748183] loop5: partition table partially beyond EOD, truncated
[ 1009.753875] IPVS: ftp: loaded support on port[0] = 21
[ 1009.773499] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
03:46:12 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

[ 1009.829230] loop5: p1 size 2 extends beyond EOD, truncated
[ 1009.932156] loop5: p4 start 1854537728 is beyond EOD, truncated
03:46:13 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x500000000000000)

[ 1010.061435] __loop_clr_fd: partition scan of loop5 failed (rc=-22)
[ 1010.171237]  loop1: p1 < > p4
[ 1010.212995] loop1: partition table partially beyond EOD, truncated
[ 1010.249879] loop1: p1 size 2 extends beyond EOD, truncated
03:46:13 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x200000000000000)

[ 1010.385493] loop1: p4 start 1854537728 is beyond EOD, truncated
[ 1010.571379] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
03:46:13 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

03:46:13 executing program 0:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
ioctl$KVM_SET_PIT(r0, 0x8048ae66, &(0x7f0000000040)={[{0x4, 0xfffffffffffffc00, 0x9, 0x2, 0x100000001, 0xa00000, 0x8, 0x8, 0x3, 0x6, 0x0, 0x4, 0x5}, {0x6, 0x8, 0x2, 0x7, 0x4e, 0x3ff, 0x1, 0x7, 0x7fffffff, 0xfff, 0x7, 0x8be3, 0x100000000}, {0x952, 0x400, 0x4, 0x8001, 0xfffffffffffff800, 0x8, 0x4, 0x2, 0xfff, 0x0, 0x5ce3, 0x80, 0x20}], 0x4})
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

03:46:13 executing program 3:
r0 = getpgid(0x0)
r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2)
perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8)
pipe(&(0x7f00000000c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
r4 = socket$inet_udp(0x2, 0x2, 0x0)
write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r5 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r2, 0x0, r4, 0x0, 0x10005, 0x0)

03:46:14 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1010.969618]  loop1: p1 < > p4
[ 1010.985329] loop1: partition table partially beyond EOD, truncated
[ 1011.001084] loop1: p1 size 2 extends beyond EOD, truncated
[ 1011.101542] loop1: p4 start 1854537728 is beyond EOD, truncated
03:46:14 executing program 4:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0y*\x02\x00', @ifru_flags})

03:46:14 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1011.310958] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
[ 1011.319531] IPVS: ftp: loaded support on port[0] = 21
03:46:14 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:46:14 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

03:46:14 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0xffffff97)

03:46:14 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, 0x0, 0x0)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:46:14 executing program 0:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getpeername$inet(r2, &(0x7f0000000040)={0x2, 0x0, @initdev}, &(0x7f0000000080)=0x10)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

03:46:14 executing program 3:
r0 = getpgid(0x0)
r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2)
perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8)
pipe(&(0x7f00000000c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
r4 = socket$inet_udp(0x2, 0x2, 0x0)
write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r5 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r2, 0x0, r4, 0x0, 0x10005, 0x0)

[ 1011.888135]  loop1: p1 < > p4
[ 1011.916629] loop1: partition table partially beyond EOD, truncated
[ 1011.962428] loop1: p1 size 2 extends beyond EOD, truncated
[ 1012.004940] loop1: p4 start 1854537728 is beyond EOD, truncated
03:46:15 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, 0x0, 0x0)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1012.132213] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
[ 1012.218149] print_req_error: 67 callbacks suppressed
[ 1012.218161] print_req_error: I/O error, dev loop1, sector 0 flags 80700
[ 1012.289255] print_req_error: I/O error, dev loop1, sector 0 flags 0
[ 1012.297337] print_req_error: I/O error, dev loop1, sector 0 flags 0
[ 1012.304408] print_req_error: I/O error, dev loop1, sector 0 flags 0
[ 1012.311408] print_req_error: I/O error, dev loop1, sector 0 flags 0
[ 1012.319462] print_req_error: I/O error, dev loop1, sector 0 flags 0
[ 1012.326502] print_req_error: I/O error, dev loop1, sector 0 flags 0
03:46:15 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

[ 1012.334405] print_req_error: I/O error, dev loop1, sector 0 flags 0
[ 1012.341355] print_req_error: I/O error, dev loop1, sector 0 flags 0
[ 1012.348640] print_req_error: I/O error, dev loop1, sector 0 flags 0
03:46:15 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, 0x0, 0x0)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1012.399593] IPVS: ftp: loaded support on port[0] = 21
[ 1012.612169]  loop1: p1 < > p4
[ 1012.630417] loop1: partition table partially beyond EOD, truncated
[ 1012.697792] loop1: p1 size 2 extends beyond EOD, truncated
[ 1012.755167] loop1: p4 start 1854537728 is beyond EOD, truncated
03:46:15 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1012.854080] net_ratelimit: 20 callbacks suppressed
[ 1012.854088] protocol 88fb is buggy, dev hsr_slave_0
[ 1012.864188] protocol 88fb is buggy, dev hsr_slave_1
[ 1012.864375] protocol 88fb is buggy, dev hsr_slave_0
[ 1012.869281] protocol 88fb is buggy, dev hsr_slave_0
[ 1012.874683] protocol 88fb is buggy, dev hsr_slave_1
[ 1012.879343] protocol 88fb is buggy, dev hsr_slave_1
[ 1012.961704] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
03:46:16 executing program 4:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0z*\x02\x00', @ifru_flags})

03:46:16 executing program 5:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x0, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:46:16 executing program 3:
r0 = getpgid(0x0)
r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2)
perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8)
pipe(&(0x7f00000000c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
r4 = socket$inet_udp(0x2, 0x2, 0x0)
write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r5 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r5, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r5, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r4, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r4, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r2, 0x0, r4, 0x0, 0x10005, 0x0)

03:46:16 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

03:46:16 executing program 0:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x6, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

03:46:16 executing program 2:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

[ 1013.505933] hfs: can't find a HFS filesystem on dev loop5
[ 1013.512971]  loop1: p1 < > p4
[ 1013.534225] loop1: partition table partially beyond EOD, truncated
[ 1013.579482] IPVS: ftp: loaded support on port[0] = 21
[ 1013.601960] loop1: p1 size 2 extends beyond EOD, truncated
03:46:16 executing program 2:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

[ 1013.654069] protocol 88fb is buggy, dev hsr_slave_0
[ 1013.655124] loop1: p4 start 1854537728 is beyond EOD, truncated
[ 1013.659241] protocol 88fb is buggy, dev hsr_slave_1
03:46:16 executing program 5:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x02N\x00', @ifru_flags})

[ 1013.734053] protocol 88fb is buggy, dev hsr_slave_0
[ 1013.739218] protocol 88fb is buggy, dev hsr_slave_1
[ 1013.749052] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
[ 1013.832644] buffer_io_error: 70 callbacks suppressed
[ 1013.832654] Buffer I/O error on dev loop1p1, logical block 0, async page read
[ 1013.839403] Buffer I/O error on dev loop1p1, logical block 0, async page read
[ 1013.854616] Buffer I/O error on dev loop1p1, logical block 0, async page read
[ 1013.862440] Buffer I/O error on dev loop1p1, logical block 0, async page read
[ 1013.871261] Buffer I/O error on dev loop1p1, logical block 0, async page read
03:46:17 executing program 2:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

[ 1013.879114] Buffer I/O error on dev loop1p1, logical block 0, async page read
[ 1013.887640] Buffer I/O error on dev loop1p1, logical block 0, async page read
[ 1013.895713] Buffer I/O error on dev loop1p1, logical block 0, async page read
[ 1013.904499] Buffer I/O error on dev loop1p1, logical block 0, async page read
[ 1013.912312] Buffer I/O error on dev loop1p1, logical block 0, async page read
03:46:17 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

[ 1014.019472] IPVS: ftp: loaded support on port[0] = 21
[ 1014.129386]  loop1: p1 < > p4
[ 1014.133098] loop1: partition table partially beyond EOD, truncated
[ 1014.176983] loop1: p1 size 2 extends beyond EOD, 
[ 1014.176992] truncated
[ 1014.191787] loop1: p4 start 1854537728 is beyond EOD, truncated
03:46:17 executing program 2:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00@\x00', @ifru_flags})

03:46:17 executing program 3:
r0 = getpgid(0x0)
r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2)
perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8)
pipe(&(0x7f00000000c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
close(0xffffffffffffffff)
write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0)

[ 1014.263410] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
[ 1014.386842] IPVS: ftp: loaded support on port[0] = 21
03:46:17 executing program 4:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0{*\x02\x00', @ifru_flags})

03:46:17 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

03:46:17 executing program 0:
openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x0, 0x0)
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r1)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10003, 0x0)

[ 1014.888356]  loop1: p1 < > p4
[ 1014.908441] loop1: partition table partially beyond EOD, truncated
[ 1014.928816] loop1: p1 size 2 extends beyond EOD, truncated
03:46:18 executing program 5:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

[ 1014.930498] IPVS: ftp: loaded support on port[0] = 21
[ 1014.948092] loop1: p4 start 1854537728 is beyond EOD, truncated
03:46:18 executing program 0:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
r3 = socket$inet(0x2, 0x3, 0x7f)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000040)=[@sack_perm, @mss={0x2, 0x9}, @mss={0x2, 0x8}, @mss={0x2, 0x3ff}, @mss, @mss={0x2, 0x3ff}, @sack_perm, @sack_perm, @window={0x3, 0xffff, 0x4}, @window={0x3, 0x3, 0x517bad62}], 0xa)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
flock(r3, 0x8)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[ 1015.015495] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
03:46:18 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

[ 1015.076869]  loop5: p1 < > p4
[ 1015.094104] loop5: partition table partially beyond EOD, truncated
[ 1015.103226] loop5: p1 size 2 extends beyond EOD, truncated
03:46:18 executing program 3:
r0 = getpgid(0x0)
r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2)
perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8)
pipe(&(0x7f00000000c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
close(0xffffffffffffffff)
write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0)

[ 1015.175215] loop5: p4 start 1854537728 is beyond EOD, truncated
[ 1015.226353] __loop_clr_fd: partition scan of loop5 failed (rc=-22)
[ 1015.365266]  loop1: p1 < > p4
[ 1015.382617] loop1: partition table partially beyond EOD, truncated
03:46:18 executing program 5:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x0, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1015.424774] loop1: p1 size 2 extends beyond EOD, truncated
[ 1015.449400] loop1: p4 start 1854537728 is beyond EOD, truncated
[ 1015.525489] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
[ 1015.597934] hfs: can't find a HFS filesystem on dev loop5
03:46:18 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aae", 0x91, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:46:18 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

[ 1015.829569]  loop5: p1 < > p4
[ 1015.841385] loop5: partition table partially beyond EOD, truncated
03:46:19 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aae", 0x91, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1015.901734] loop5: p1 size 2 extends beyond EOD, truncated
[ 1015.926576]  loop1: p1 < > p4
[ 1015.930385] loop1: partition table partially beyond EOD, truncated
[ 1015.973912] loop1: p1 size 2 extends beyond EOD, truncated
03:46:19 executing program 0:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000240)={<r4=>0x0, 0xbc, "52308b074115cc2eaa5e36d977f8e510ede024216da7e0f4119bfe27b98141065ac7853ae9e3f1d21505469b0bfb736c3f6c8da688475d753a47d7e3eaa0e01ab4be9d014894303509b18f181fd7f05e58c138a119236343609be77ad5dae98badee0e7b34fefecd1f6b460cae3ecc42c8a71730e9dcbe8554f2a287c46ca8ecf0241b4be11f18a224463f135dd3efbf29b49a3689fb94be37b65f6964eaca16053ef2993c24002dbe59d6d4ec5e22a42b8d5e4267c83fc58977c828"}, &(0x7f0000000040)=0xc4)
setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f0000000080)={r4, 0x800, 0x8}, 0x8)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000100)=@assoc_value={r4, 0x100000001}, 0x8)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[ 1016.024634] loop1: p4 start 1854537728 is beyond EOD, truncated
[ 1016.032710] loop5: p4 start 1854537728 is beyond EOD, truncated
03:46:19 executing program 4:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0|*\x02\x00', @ifru_flags})

03:46:19 executing program 3:
r0 = getpgid(0x0)
r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2)
perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8)
pipe(&(0x7f00000000c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
close(0xffffffffffffffff)
write$binfmt_misc(r3, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x10005, 0x0)

03:46:19 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aae", 0x91, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1016.197637] __loop_clr_fd: partition scan of loop5 failed (rc=-22)
[ 1016.203000] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
[ 1016.319614] IPVS: ftp: loaded support on port[0] = 21
03:46:19 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

03:46:19 executing program 5:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0x0, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:46:19 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed3", 0x8f, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1016.586192]  loop1: p1 < > p4
[ 1016.597670] loop1: partition table partially beyond EOD, truncated
[ 1016.647287] loop1: p1 size 2 extends beyond EOD, truncated
[ 1016.655168] loop1: p4 start 1854537728 is beyond EOD, truncated
[ 1016.696681] hfs: can't find a HFS filesystem on dev loop5
[ 1016.756633] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
03:46:19 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed3", 0x8f, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:46:19 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

[ 1017.040519]  loop5: p1 < > p4
[ 1017.057628] loop5: partition table partially beyond EOD, truncated
[ 1017.086187]  loop1: p1 < > p4
[ 1017.091838] loop1: partition table partially beyond EOD, truncated
03:46:20 executing program 3:
r0 = getpgid(0x0)
r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2)
perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x10005, 0x0)

[ 1017.126285] loop5: p1 size 2 extends beyond EOD, truncated
[ 1017.148416] loop1: p1 size 2 extends beyond EOD, truncated
[ 1017.186856] loop5: p4 start 1854537728 is beyond EOD, truncated
[ 1017.195465] loop1: p4 start 1854537728 is beyond EOD, truncated
03:46:20 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed3", 0x8f, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1017.330052] __loop_clr_fd: partition scan of loop5 failed (rc=-22)
03:46:20 executing program 3:
r0 = getpgid(0x0)
r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2)
perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x10005, 0x0)

03:46:20 executing program 0:
pipe(&(0x7f00000000c0)={0xffffffffffffffff, <r0=>0xffffffffffffffff})
r1 = socket$inet_udp(0x2, 0x2, 0x0)
close(r1)
write$binfmt_misc(r0, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r2 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r0, 0x5414, 0x0)
socketpair$unix(0x1, 0x400000000000005, 0x0, &(0x7f0000000340)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200)
openat$zero(0xffffffffffffff9c, 0x0, 0x10000, 0x0)
ioctl$BLKRRPART(0xffffffffffffffff, 0x125f, 0x0)
r4 = socket$inet(0x2, 0x1, 0x0)
socket$netlink(0x10, 0x3, 0x0)
bind$inet(r4, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10)
getitimer(0x0, 0x0)
sendto$inet(r4, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10)
setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0)
request_key(0x0, 0x0, 0x0, 0x0)
add_key$user(0x0, 0x0, 0x0, 0xaabff31a8369fc28, 0x0)
openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0)
openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0)
prctl$PR_GET_TSC(0x19, 0x0)
fsetxattr$trusted_overlay_redirect(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0)
socket$inet_udplite(0x2, 0x2, 0x88)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0)
openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, 0x0)
prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, 0xffffffffffffffff)

[ 1017.398257] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
[ 1017.541335] print_req_error: 100 callbacks suppressed
[ 1017.541347] print_req_error: I/O error, dev loop5, sector 0 flags 80700
[ 1017.574684] print_req_error: I/O error, dev loop1, sector 0 flags 80700
[ 1017.581550] print_req_error: I/O error, dev loop5, sector 0 flags 0
[ 1017.589353] print_req_error: I/O error, dev loop5, sector 0 flags 0
[ 1017.599122] print_req_error: I/O error, dev loop5, sector 0 flags 0
[ 1017.606377] print_req_error: I/O error, dev loop5, sector 0 flags 0
[ 1017.612512] print_req_error: I/O error, dev loop1, sector 0 flags 0
[ 1017.614700] print_req_error: I/O error, dev loop5, sector 0 flags 0
[ 1017.622962] print_req_error: I/O error, dev loop1, sector 0 flags 0
[ 1017.632557] print_req_error: I/O error, dev loop1, sector 0 flags 0
03:46:20 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

03:46:20 executing program 5:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:46:20 executing program 4:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0}*\x02\x00', @ifru_flags})

03:46:20 executing program 3:
r0 = getpgid(0x0)
r1 = syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2)
perf_event_open(&(0x7f0000000240)={0x3, 0x70, 0x0, 0x5, 0x80, 0x8, 0x0, 0x7, 0x28082, 0x5, 0x7fffffff, 0x3, 0xffff, 0x8, 0x27, 0x3ff, 0x8, 0xfffffffffffffff9, 0x761, 0x9, 0x5, 0x4, 0x4, 0x8, 0x100000001, 0x100000000, 0x8, 0x800, 0x311, 0x0, 0x9, 0xdff0, 0xa5, 0x4, 0x4, 0x5, 0x8, 0x2, 0x0, 0x7, 0x1, @perf_config_ext={0xe7a00000, 0x4}, 0x0, 0xffffffffffffff63, 0x101, 0x8, 0x4, 0xfffffffffffff997, 0x8}, r0, 0xc, r1, 0x8)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(0xffffffffffffffff, 0x0, r2, 0x0, 0x10005, 0x0)

03:46:20 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x0, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1017.865420] IPVS: ftp: loaded support on port[0] = 21
03:46:21 executing program 3:
getpgid(0x0)
syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2)
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[ 1017.894121] net_ratelimit: 22 callbacks suppressed
[ 1017.894135] protocol 88fb is buggy, dev hsr_slave_0
[ 1017.904311] protocol 88fb is buggy, dev hsr_slave_1
[ 1017.909485] protocol 88fb is buggy, dev hsr_slave_0
[ 1017.914601] protocol 88fb is buggy, dev hsr_slave_1
[ 1017.931955] hfs: can't find a HFS filesystem on dev loop5
[ 1017.943131]  loop1: p1 < > p4
[ 1017.968298] loop1: partition table partially beyond EOD, truncated
[ 1018.003286] loop1: p1 size 2 extends beyond EOD, truncated
[ 1018.046443] loop1: p4 start 1854537728 is beyond EOD, truncated
03:46:21 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x0, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1018.127012] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
[ 1018.166053]  loop5: p1 < > p4
[ 1018.187634] loop5: partition table partially beyond EOD, truncated
03:46:21 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

[ 1018.233970] loop5: p1 size 2 extends beyond EOD, 
[ 1018.251484] truncated
[ 1018.351567] loop5: p4 start 1854537728 is beyond EOD, truncated
[ 1018.485833] __loop_clr_fd: partition scan of loop5 failed (rc=-22)
03:46:21 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x0, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1018.544591]  loop1: p1 < > p4
[ 1018.547912] loop1: partition table partially beyond EOD, truncated
[ 1018.604393] loop1: p1 size 2 extends beyond EOD, truncated
[ 1018.626202] loop1: p4 start 1854537728 is beyond EOD, truncated
03:46:21 executing program 0:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r1)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

03:46:21 executing program 5:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1018.766159] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
03:46:21 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

[ 1018.841983] buffer_io_error: 110 callbacks suppressed
[ 1018.841995] Buffer I/O error on dev loop1p1, logical block 0, async page read
[ 1018.856134] Buffer I/O error on dev loop1p1, logical block 0, async page read
[ 1018.863754] Buffer I/O error on dev loop1p1, logical block 0, async page read
[ 1018.871988] Buffer I/O error on dev loop1p1, logical block 0, async page read
[ 1018.872088] hfs: can't find a HFS filesystem on dev loop5
[ 1018.879695] Buffer I/O error on dev loop1p1, logical block 0, async page read
03:46:22 executing program 3:
getpgid(0x0)
syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2)
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[ 1018.893897] Buffer I/O error on dev loop1p1, logical block 0, async page read
[ 1018.902226] Buffer I/O error on dev loop1p1, logical block 0, async page read
[ 1018.909839] Buffer I/O error on dev loop1p1, logical block 0, async page read
[ 1018.917515] Buffer I/O error on dev loop1p1, logical block 0, async page read
[ 1018.925114] Buffer I/O error on dev loop1p1, logical block 0, async page read
03:46:22 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7", 0x4a, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1019.162877]  loop1: p1 < > p4
[ 1019.164452]  loop5: p1 < > p4
[ 1019.181709] loop5: partition table partially beyond EOD, truncated
[ 1019.192319] loop1: partition table partially beyond EOD, truncated
[ 1019.247557] loop5: p1 size 2 extends beyond EOD, truncated
[ 1019.281919] loop1: p1 size 2 extends beyond EOD, truncated
[ 1019.371658] loop5: p4 start 1854537728 is beyond EOD, truncated
[ 1019.373673] loop1: p4 start 1854537728 is beyond EOD, truncated
[ 1019.434518] __loop_clr_fd: partition scan of loop5 failed (rc=-22)
03:46:22 executing program 4:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0~*\x02\x00', @ifru_flags})

03:46:22 executing program 0:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r1, 0x0, 0x5, 0x0)
pipe(&(0x7f0000000040))

03:46:22 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x0, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1019.593366] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
03:46:22 executing program 5:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x0, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1019.749941] IPVS: ftp: loaded support on port[0] = 21
03:46:22 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

03:46:23 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, 0x0)
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1019.871825] hfs: can't find a HFS filesystem on dev loop5
[ 1019.895113] protocol 88fb is buggy, dev hsr_slave_0
[ 1019.901202] protocol 88fb is buggy, dev hsr_slave_1
[ 1019.987439] protocol 88fb is buggy, dev hsr_slave_0
[ 1019.992604] protocol 88fb is buggy, dev hsr_slave_1
[ 1019.997747] protocol 88fb is buggy, dev hsr_slave_0
[ 1020.002799] protocol 88fb is buggy, dev hsr_slave_1
03:46:23 executing program 3:
getpgid(0x0)
syz_open_dev$cec(&(0x7f0000000100)='/dev/cec#\x00', 0x0, 0x2)
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[ 1020.340206]  loop1: p1 < > p4
03:46:23 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x0, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1020.364407] loop1: partition table partially beyond EOD, truncated
[ 1020.369806]  loop5: p1 < > p4
[ 1020.377169] loop1: p1 size 2 extends beyond EOD, truncated
[ 1020.418628] loop5: partition table partially beyond EOD, truncated
[ 1020.461860] loop1: p4 start 1854537728 is beyond EOD, truncated
[ 1020.573754] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
[ 1020.578656] loop5: p1 size 2 extends beyond EOD, truncated
03:46:23 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

[ 1020.718191] loop5: p4 start 1854537728 is beyond EOD, truncated
03:46:23 executing program 0:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
r3 = socket$inet(0x2, 0x3, 0x7f)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
ioctl$sock_ax25_SIOCADDRT(r1, 0x890b, &(0x7f0000000040)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3, [@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @default, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}]})
setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

03:46:23 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1020.837213] __loop_clr_fd: partition scan of loop5 failed (rc=-22)
03:46:24 executing program 5:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1021.029418] IPVS: ftp: loaded support on port[0] = 21
[ 1021.085733]  loop1: p1 < > p4
[ 1021.112829] loop1: partition table partially beyond EOD, truncated
[ 1021.124278] hfs: can't find a HFS filesystem on dev loop5
[ 1021.221761] loop1: p1 size 2 extends beyond EOD, truncated
[ 1021.290445] loop1: p4 start 1854537728 is beyond EOD, truncated
[ 1021.484122] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
[ 1021.529238]  loop5: p1 < > p4
[ 1021.548223] loop5: partition table partially beyond EOD, truncated
03:46:24 executing program 4:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x7f*\x02\x00', @ifru_flags})

03:46:24 executing program 3:
getpgid(0x0)
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

03:46:24 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:46:24 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x0, 0x0)
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

[ 1021.592086] loop5: p1 size 2 extends beyond EOD, truncated
[ 1021.722504] loop5: p4 start 1854537728 is beyond EOD, truncated
[ 1021.785980] IPVS: ftp: loaded support on port[0] = 21
[ 1021.818673] __loop_clr_fd: partition scan of loop5 failed (rc=-22)
[ 1021.950669] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
03:46:25 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x0, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:46:25 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x0, 0x0)
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

03:46:25 executing program 5:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:46:25 executing program 0:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x200000000000024f, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
ioctl$RTC_AIE_ON(r0, 0x7001)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

03:46:25 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0xe)

[ 1022.430540] hfs: can't find a HFS filesystem on dev loop5
[ 1022.440250] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
03:46:25 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x0, 0x0)
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

03:46:25 executing program 5:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:46:25 executing program 3:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[ 1022.912693] hfs: can't find a HFS filesystem on dev loop5
[ 1023.069155] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
[ 1023.254390] net_ratelimit: 12 callbacks suppressed
[ 1023.254464] protocol 88fb is buggy, dev hsr_slave_0
[ 1023.254516] protocol 88fb is buggy, dev hsr_slave_0
[ 1023.260213] protocol 88fb is buggy, dev hsr_slave_1
[ 1023.265171] protocol 88fb is buggy, dev hsr_slave_1
[ 1023.281151] protocol 88fb is buggy, dev hsr_slave_0
[ 1023.287939] protocol 88fb is buggy, dev hsr_slave_1
03:46:26 executing program 4:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x80*\x02\x00', @ifru_flags})

03:46:26 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x0, &(0x7f0000000480))
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

03:46:26 executing program 5:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:46:26 executing program 0:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$sock_inet_SIOCSIFPFLAGS(r3, 0x8934, &(0x7f0000000040)={'veth1_to_bridge\x00', 0x52d1})
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)
openat$cgroup_procs(r1, &(0x7f0000000000)='cgroup.threads\x00', 0x2, 0x0)

03:46:26 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0xe)

[ 1023.462016] IPVS: ftp: loaded support on port[0] = 21
[ 1023.640302] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
03:46:26 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x0, &(0x7f0000000480))
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

03:46:26 executing program 5:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x0, 0x0)
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

03:46:27 executing program 3:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[ 1024.055101] protocol 88fb is buggy, dev hsr_slave_0
[ 1024.060864] protocol 88fb is buggy, dev hsr_slave_1
[ 1024.134158] protocol 88fb is buggy, dev hsr_slave_0
[ 1024.139289] protocol 88fb is buggy, dev hsr_slave_1
[ 1024.151673] __loop_clr_fd: partition scan of loop5 failed (rc=-22)
[ 1024.205628] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
03:46:27 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x7)

03:46:27 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x0, &(0x7f0000000480))
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

03:46:27 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x5)

03:46:27 executing program 0:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
setsockopt$IP_VS_SO_SET_EDIT(r2, 0x0, 0x483, &(0x7f0000000040)={0x89, @multicast1, 0x4e20, 0x3, 'ovf\x00', 0x10, 0x101, 0x69}, 0x2c)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[ 1024.617922] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
[ 1024.736197] IPVS: set_ctl: invalid protocol: 137 224.0.0.1:20000
03:46:28 executing program 4:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x81*\x02\x00', @ifru_flags})

03:46:28 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

[ 1025.027957] IPVS: ftp: loaded support on port[0] = 21
03:46:28 executing program 3:
pipe(0x0)
r0 = socket$inet_udp(0x2, 0x2, 0x0)
close(r0)
write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r1 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10005, 0x0)

[ 1025.107247] Dev loop1: unable to read RDB block 1
[ 1025.112913]  loop1: unable to read partition table
[ 1025.137624] loop1: partition table beyond EOD, truncated
03:46:28 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x7)

[ 1025.162222] loop_reread_partitions: partition scan of loop1 () failed (rc=-5)
03:46:28 executing program 3:
pipe(0x0)
r0 = socket$inet_udp(0x2, 0x2, 0x0)
close(r0)
write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r1 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10005, 0x0)

03:46:28 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x5)

[ 1025.354276] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
03:46:28 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

03:46:28 executing program 3:
pipe(0x0)
r0 = socket$inet_udp(0x2, 0x2, 0x0)
close(r0)
write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r1 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(0xffffffffffffffff, 0x0, r0, 0x0, 0x10005, 0x0)

[ 1025.597724] Dev loop1: unable to read RDB block 1
[ 1025.638605]  loop1: unable to read partition table
03:46:28 executing program 3:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(0xffffffffffffffff)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

03:46:28 executing program 0:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
r3 = socket$inet(0x2, 0x3, 0x7f)
r4 = socket$packet(0x11, 0x3, 0x300)
shmget$private(0x0, 0x2000, 0x452, &(0x7f0000ffd000/0x2000)=nil)
setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r0, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r5 = geteuid()
setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000240)={{{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in=@local, 0x4e24, 0x8, 0x4e23, 0x3, 0xa, 0x20, 0x80, 0x3b, 0x0, r5}, {0x7, 0x2, 0x5, 0x7, 0x0, 0x5, 0x3d6, 0xffffffff}, {0x5, 0x7569, 0x2, 0x4}, 0x72, 0x6e6bb9, 0x1, 0x1, 0x0, 0x1}, {{@in=@empty, 0x4d5, 0xff}, 0x2, @in6=@ipv4={[], [], @local}, 0x3506, 0x3, 0x0, 0x6, 0x1, 0x50, 0x3}}, 0xe8)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[ 1025.681611] loop1: partition table beyond EOD, truncated
[ 1025.707051] loop_reread_partitions: partition scan of loop1 () failed (rc=-5)
[ 1025.785793] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
03:46:28 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{0x0, 0x0, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

[ 1026.098607] Dev loop1: unable to read RDB block 1
[ 1026.159281]  loop1: unable to read partition table
[ 1026.167543] loop1: partition table beyond EOD, truncated
[ 1026.199008] loop_reread_partitions: partition scan of loop1 () failed (rc=-5)
[ 1026.255153] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
03:46:29 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x5)

03:46:29 executing program 4:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x82*\x02\x00', @ifru_flags})

03:46:29 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000), 0x0, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

03:46:29 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x4)

[ 1026.468886] IPVS: ftp: loaded support on port[0] = 21
[ 1026.509502] Dev loop1: unable to read RDB block 1
[ 1026.516016]  loop1: unable to read partition table
[ 1026.541399] loop1: partition table beyond EOD, truncated
[ 1026.604475] loop_reread_partitions: partition scan of loop1 () failed (rc=-5)
[ 1026.784483] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
03:46:29 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000), 0x0, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

03:46:30 executing program 3:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(0xffffffffffffffff)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[ 1027.130425] Dev loop1: unable to read RDB block 1
03:46:30 executing program 0:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
socket$bt_bnep(0x1f, 0x3, 0x4)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
accept$inet(r0, &(0x7f0000000040)={0x2, 0x0, @dev}, &(0x7f0000000080)=0x10)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[ 1027.184096]  loop1: unable to read partition table
[ 1027.200184] loop1: partition table beyond EOD, truncated
[ 1027.209620] loop_reread_partitions: partition scan of loop1 () failed (rc=-5)
03:46:30 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x4)

03:46:30 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
r3 = socket$inet(0x2, 0x3, 0x7f)
r4 = socket$packet(0x11, 0x3, 0x300)
shmget$private(0x0, 0x2000, 0x452, &(0x7f0000ffd000/0x2000)=nil)
setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r0, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r5 = geteuid()
setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000240)={{{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in=@local, 0x4e24, 0x8, 0x4e23, 0x3, 0xa, 0x20, 0x80, 0x3b, 0x0, r5}, {0x7, 0x2, 0x5, 0x7, 0x0, 0x5, 0x3d6, 0xffffffff}, {0x5, 0x7569, 0x2, 0x4}, 0x72, 0x6e6bb9, 0x1, 0x1, 0x0, 0x1}, {{@in=@empty, 0x4d5, 0xff}, 0x2, @in6=@ipv4={[], [], @local}, 0x3506, 0x3, 0x0, 0x6, 0x1, 0x50, 0x3}}, 0xe8)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[ 1027.277350] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
03:46:30 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000), 0x0, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

[ 1027.549152] Dev loop1: unable to read RDB block 1
[ 1027.599031]  loop1: unable to read partition table
[ 1027.624464] loop1: partition table beyond EOD, truncated
[ 1027.654576] loop_reread_partitions: partition scan of loop1 () failed (rc=-5)
03:46:30 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000", 0x30, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

[ 1027.860827] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
03:46:31 executing program 3:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(0xffffffffffffffff)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

03:46:31 executing program 4:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x83*\x02\x00', @ifru_flags})

[ 1028.079500] Dev loop1: unable to read RDB block 1
[ 1028.098019]  loop1: unable to read partition table
[ 1028.104812] IPVS: ftp: loaded support on port[0] = 21
[ 1028.116290] loop1: partition table beyond EOD, truncated
[ 1028.122251] loop_reread_partitions: partition scan of loop1 () failed (rc=-5)
03:46:31 executing program 5:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:46:31 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
r3 = socket$inet(0x2, 0x3, 0x7f)
r4 = socket$packet(0x11, 0x3, 0x300)
shmget$private(0x0, 0x2000, 0x452, &(0x7f0000ffd000/0x2000)=nil)
setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r0, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r5 = geteuid()
setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000240)={{{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in=@local, 0x4e24, 0x8, 0x4e23, 0x3, 0xa, 0x20, 0x80, 0x3b, 0x0, r5}, {0x7, 0x2, 0x5, 0x7, 0x0, 0x5, 0x3d6, 0xffffffff}, {0x5, 0x7569, 0x2, 0x4}, 0x72, 0x6e6bb9, 0x1, 0x1, 0x0, 0x1}, {{@in=@empty, 0x4d5, 0xff}, 0x2, @in6=@ipv4={[], [], @local}, 0x3506, 0x3, 0x0, 0x6, 0x1, 0x50, 0x3}}, 0xe8)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[ 1028.294058] net_ratelimit: 22 callbacks suppressed
[ 1028.294065] protocol 88fb is buggy, dev hsr_slave_0
[ 1028.304195] protocol 88fb is buggy, dev hsr_slave_1
[ 1028.309349] protocol 88fb is buggy, dev hsr_slave_0
[ 1028.314449] protocol 88fb is buggy, dev hsr_slave_1
[ 1028.360542] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
03:46:31 executing program 0:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000040)=0x8)
ioctl$VIDIOC_SUBDEV_S_FMT(r1, 0xc0585605, &(0x7f0000000240)={0x1, 0x0, {0x40, 0x495, 0x2014, 0x7, 0xb, 0x0, 0x1}})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
sync_file_range(r0, 0x20, 0x800, 0x0)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @broadcast}, 0xfffffffffffffe56)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

03:46:31 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000", 0x30, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

[ 1028.487993]  loop5: p1 < > p4
[ 1028.492884] loop5: partition table partially beyond EOD, truncated
[ 1028.527303] loop5: p1 size 2 extends beyond EOD, truncated
[ 1028.660591] loop5: p4 start 1854537728 is beyond EOD, truncated
[ 1028.764589] Dev loop1: unable to read RDB block 1
[ 1028.798043]  loop1: unable to read partition table
[ 1028.842200] loop1: partition table beyond EOD, truncated
[ 1028.871170] loop_reread_partitions: partition scan of loop1 () failed (rc=-5)
[ 1028.890070] print_req_error: 111 callbacks suppressed
[ 1028.890082] print_req_error: I/O error, dev loop5, sector 0 flags 80700
[ 1028.904530] __loop_clr_fd: partition scan of loop5 failed (rc=-22)
[ 1028.916853] print_req_error: I/O error, dev loop5, sector 0 flags 0
[ 1028.923502] buffer_io_error: 60 callbacks suppressed
[ 1028.923512] Buffer I/O error on dev loop5p1, logical block 0, async page read
[ 1028.936701] print_req_error: I/O error, dev loop5, sector 0 flags 0
[ 1028.943300] Buffer I/O error on dev loop5p1, logical block 0, async page read
[ 1028.952013] print_req_error: I/O error, dev loop5, sector 0 flags 0
[ 1028.958794] Buffer I/O error on dev loop5p1, logical block 0, async page read
03:46:32 executing program 3:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff})
r1 = socket$inet_udp(0x2, 0x2, 0x0)
close(r1)
write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r2 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r1, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r1, 0x0, 0x10005, 0x0)

[ 1029.010891] print_req_error: I/O error, dev loop5, sector 0 flags 0
[ 1029.017489] Buffer I/O error on dev loop5p1, logical block 0, async page read
[ 1029.025961] print_req_error: I/O error, dev loop5, sector 0 flags 0
[ 1029.032437] Buffer I/O error on dev loop5p1, logical block 0, async page read
[ 1029.040012] print_req_error: I/O error, dev loop5, sector 0 flags 0
[ 1029.046537] Buffer I/O error on dev loop5p1, logical block 0, async page read
[ 1029.075348] print_req_error: I/O error, dev loop5, sector 0 flags 0
[ 1029.081958] Buffer I/O error on dev loop5p1, logical block 0, async page read
[ 1029.092381] print_req_error: I/O error, dev loop5, sector 0 flags 0
[ 1029.099004] Buffer I/O error on dev loop5p1, logical block 0, async page read
[ 1029.108079] print_req_error: I/O error, dev loop5, sector 0 flags 0
[ 1029.114672] Buffer I/O error on dev loop5p1, logical block 0, async page read
03:46:32 executing program 5:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1029.123588] Buffer I/O error on dev loop5p1, logical block 0, async page read
[ 1029.166859] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
03:46:32 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000", 0x30, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

03:46:32 executing program 2:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000", 0x30, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

[ 1029.448035]  loop5: p1 < > p4
[ 1029.465761] loop5: partition table partially beyond EOD, truncated
[ 1029.494119] protocol 88fb is buggy, dev hsr_slave_0
[ 1029.495079] protocol 88fb is buggy, dev hsr_slave_0
[ 1029.499268] protocol 88fb is buggy, dev hsr_slave_1
[ 1029.504610] protocol 88fb is buggy, dev hsr_slave_1
[ 1029.515670] protocol 88fb is buggy, dev hsr_slave_0
[ 1029.521400] protocol 88fb is buggy, dev hsr_slave_1
[ 1029.524570] IPVS: ftp: loaded support on port[0] = 21
03:46:32 executing program 0:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[ 1029.557634] loop5: p1 size 2 extends beyond EOD, 
[ 1029.565107] truncated
[ 1029.623546] loop5: p4 start 1854537728 is beyond EOD, truncated
[ 1029.635223] Dev loop1: unable to read RDB block 1
03:46:32 executing program 2:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000", 0x30, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

[ 1029.668225]  loop1: unable to read partition table
[ 1029.697009] loop1: partition table beyond EOD, truncated
[ 1029.708097] loop_reread_partitions: partition scan of loop1 () failed (rc=-5)
[ 1029.814696] __loop_clr_fd: partition scan of loop5 failed (rc=-22)
[ 1029.925198] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
03:46:33 executing program 2:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000", 0x30, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

03:46:33 executing program 4:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x84*\x02\x00', @ifru_flags})

03:46:33 executing program 3:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff})
r1 = socket$inet_udp(0x2, 0x2, 0x0)
close(r1)
write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r2 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r1, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r1, 0x0, 0x10005, 0x0)

03:46:33 executing program 5:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:46:33 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000", 0x48, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

03:46:33 executing program 2:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000", 0x30, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

03:46:33 executing program 0:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$TIOCEXCL(r1, 0x540c)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[ 1030.688477] IPVS: ftp: loaded support on port[0] = 21
[ 1030.705949] Dev loop1: unable to read RDB block 1
[ 1030.716396]  loop5: p1 < > p4
[ 1030.728824]  loop1: unable to read partition table
03:46:33 executing program 2:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000", 0x30, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

[ 1030.734228] loop5: partition table partially beyond EOD, truncated
[ 1030.788259] loop5: p1 size 2 extends beyond EOD, 
[ 1030.789799] loop1: partition table beyond EOD, 
[ 1030.795724] truncated
[ 1030.839521] truncated
[ 1030.860027] loop5: p4 start 1854537728 is beyond EOD, truncated
[ 1030.874123] loop_reread_partitions: partition scan of loop1 () failed (rc=-5)
[ 1030.996740] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
03:46:34 executing program 2:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000", 0x30, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

[ 1031.072180] __loop_clr_fd: partition scan of loop5 failed (rc=-22)
03:46:34 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000", 0x48, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

03:46:34 executing program 5:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x83*\x02\x00', @ifru_flags})

03:46:34 executing program 2:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0:\x01\x00', @ifru_flags})

03:46:34 executing program 3:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff})
r1 = socket$inet_udp(0x2, 0x2, 0x0)
close(r1)
write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r2 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r1, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r1, 0x0, 0x10005, 0x0)

[ 1031.412469] Dev loop1: unable to read RDB block 1
[ 1031.420696] IPVS: ftp: loaded support on port[0] = 21
[ 1031.428384]  loop1: unable to read partition table
[ 1031.446367] loop1: partition table beyond EOD, truncated
[ 1031.472799] loop_reread_partitions: partition scan of loop1 () failed (rc=-5)
[ 1031.596358] IPVS: ftp: loaded support on port[0] = 21
[ 1031.629502] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
03:46:35 executing program 4:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x85*\x02\x00', @ifru_flags})

03:46:35 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000", 0x48, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

03:46:35 executing program 0:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000040)=ANY=[], 0x4240a41d)
r3 = socket$inet(0x2, 0x3, 0x7f)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r3, &(0x7f0000000200)={0x2, 0x0, @remote}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[ 1032.133728] IPVS: ftp: loaded support on port[0] = 21
[ 1032.216716] Dev loop1: unable to read RDB block 1
[ 1032.265997]  loop1: unable to read partition table
[ 1032.336912] loop1: partition table beyond EOD, truncated
03:46:35 executing program 3:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, 0x0, 0x0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[ 1032.391347] loop_reread_partitions: partition scan of loop1 () failed (rc=-5)
03:46:35 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$TIOCEXCL(r1, 0x540c)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[ 1032.465521] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
[ 1032.535387] IPv6: : Disabled Multicast RS
03:46:35 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x54, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

03:46:35 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1032.770869] Dev loop1: unable to read RDB block 1
[ 1032.784854]  loop1: unable to read partition table
[ 1032.790100] loop1: partition table beyond EOD, truncated
[ 1032.835613] loop_reread_partitions: partition scan of loop1 () failed (rc=-5)
[ 1033.030907] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
03:46:36 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x54, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

03:46:36 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1033.215368] IPVS: ftp: loaded support on port[0] = 21
03:46:36 executing program 0:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
getsockopt$SO_COOKIE(r3, 0x1, 0x39, &(0x7f0000000040), &(0x7f0000000080)=0x8)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)
setsockopt$inet_mreq(r2, 0x0, 0x0, &(0x7f0000000100)={@local, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x8)

[ 1033.286949] Dev loop1: unable to read RDB block 1
03:46:36 executing program 3:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, 0x0, 0x0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[ 1033.348985]  loop1: unable to read partition table
[ 1033.408806] loop1: partition table beyond EOD, truncated
[ 1033.441395] loop_reread_partitions: partition scan of loop1 () failed (rc=-5)
03:46:36 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$TIOCEXCL(r1, 0x540c)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[ 1033.575117] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
[ 1033.654077] net_ratelimit: 18 callbacks suppressed
[ 1033.654084] protocol 88fb is buggy, dev hsr_slave_0
[ 1033.654088] protocol 88fb is buggy, dev hsr_slave_0
[ 1033.654126] protocol 88fb is buggy, dev hsr_slave_1
[ 1033.659144] protocol 88fb is buggy, dev hsr_slave_1
[ 1033.664215] protocol 88fb is buggy, dev hsr_slave_0
[ 1033.684341] protocol 88fb is buggy, dev hsr_slave_1
03:46:36 executing program 4:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00\x00\x03\x00', @ifru_flags})

03:46:36 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:46:36 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x54, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

[ 1033.932048] IPVS: ftp: loaded support on port[0] = 21
[ 1033.935947] Dev loop1: unable to read RDB block 1
[ 1033.969003]  loop1: unable to read partition table
[ 1034.005425] loop1: partition table beyond EOD, truncated
[ 1034.036836] loop_reread_partitions: partition scan of loop1 () failed (rc=-5)
03:46:37 executing program 2:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x54, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

[ 1034.145660] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
03:46:37 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e", 0x5a, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

03:46:37 executing program 3:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, 0x0, 0x0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[ 1034.322590] Dev loop1: unable to read RDB block 1
[ 1034.330653]  loop1: unable to read partition table
[ 1034.351175] loop1: partition table beyond EOD, truncated
03:46:37 executing program 2:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x54, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

[ 1034.390001] loop_reread_partitions: partition scan of loop1 () failed (rc=-5)
03:46:37 executing program 5:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
ioctl$TIOCEXCL(r1, 0x540c)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[ 1034.454049] protocol 88fb is buggy, dev hsr_slave_0
[ 1034.459163] protocol 88fb is buggy, dev hsr_slave_1
[ 1034.475243] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
[ 1034.534066] protocol 88fb is buggy, dev hsr_slave_0
[ 1034.539193] protocol 88fb is buggy, dev hsr_slave_1
03:46:37 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e", 0x5a, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

03:46:37 executing program 0:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000080)=@add_del={0x2, &(0x7f0000000040)='lapb0\x00'})
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
ioctl$SG_GET_COMMAND_Q(r1, 0x2270, &(0x7f0000000100))
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

03:46:37 executing program 2:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000", 0x54, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

[ 1034.799709] Dev loop1: unable to read RDB block 1
[ 1034.841476]  loop1: unable to read partition table
[ 1034.884624] loop1: partition table beyond EOD, truncated
[ 1034.922012] loop_reread_partitions: partition scan of loop1 () failed (rc=-5)
[ 1034.956245] IPv6: : Disabled Multicast RS
[ 1035.025690] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
03:46:38 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:46:38 executing program 4:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00\x00\x04\x00', @ifru_flags})

03:46:38 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e", 0x5a, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

03:46:38 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:46:38 executing program 3:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x0, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[ 1035.382900] IPVS: ftp: loaded support on port[0] = 21
03:46:38 executing program 5:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:46:38 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10003, 0x0)

[ 1035.427005] Dev loop1: unable to read RDB block 1
[ 1035.432724]  loop1: unable to read partition table
[ 1035.485822] loop1: partition table beyond EOD, truncated
[ 1035.512653] loop_reread_partitions: partition scan of loop1 () failed (rc=-5)
[ 1035.578153] hfs: can't find a HFS filesystem on dev loop5
[ 1035.756328] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
[ 1035.788433] Dev loop5: unable to read RDB block 1
[ 1035.825277]  loop5: unable to read partition table
[ 1035.845899] loop5: partition table beyond EOD, truncated
[ 1035.881696] loop_reread_partitions: partition scan of loop5 () failed (rc=-5)
03:46:39 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c000", 0x5d, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

[ 1036.073668] __loop_clr_fd: partition scan of loop5 failed (rc=-22)
03:46:39 executing program 0:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000080), &(0x7f0000000100)=0x4)
r3 = socket$inet(0x2, 0x3, 0x7f)
r4 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x25b, &(0x7f0000000240)}, 0xfffffde3)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
creat(&(0x7f0000000040)='./file0\x00', 0x81)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
setsockopt$inet_mreq(r3, 0x0, 0x27, &(0x7f00000001c0)={@loopback, @multicast1}, 0x8)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[ 1036.125709] Dev loop1: unable to read RDB block 1
[ 1036.173699]  loop1: unable to read partition table
03:46:39 executing program 3:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x0, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

03:46:39 executing program 5:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1036.200364] loop1: partition table beyond EOD, truncated
[ 1036.220128] loop_reread_partitions: partition scan of loop1 () failed (rc=-5)
[ 1036.292640] IPv6: : Disabled Multicast RS
[ 1036.307286] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
03:46:39 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c000", 0x5d, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

03:46:39 executing program 2:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10003, 0x0)

[ 1036.399689] hfs: can't find a HFS filesystem on dev loop5
03:46:39 executing program 4:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00\x00\x00\x01\x00', @ifru_flags})

[ 1036.536955] Dev loop5: unable to read RDB block 1
[ 1036.545845]  loop5: unable to read partition table
[ 1036.561820] Dev loop1: unable to read RDB block 1
[ 1036.572099] loop5: partition table beyond EOD, truncated
[ 1036.586602]  loop1: unable to read partition table
[ 1036.595076] IPVS: ftp: loaded support on port[0] = 21
[ 1036.617946] loop_reread_partitions: partition scan of loop5 () failed (rc=-5)
[ 1036.629410] loop1: partition table beyond EOD, truncated
[ 1036.658167] loop_reread_partitions: partition scan of loop1 () failed (rc=-5)
[ 1036.736747] __loop_clr_fd: partition scan of loop5 failed (rc=-22)
03:46:39 executing program 5:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e", 0x5a, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

[ 1036.883090] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
03:46:40 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c000", 0x5d, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

[ 1037.101087] Dev loop5: unable to read RDB block 1
03:46:40 executing program 3:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x0, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[ 1037.128615]  loop5: unable to read partition table
[ 1037.145615] Dev loop1: unable to read RDB block 1
[ 1037.150597] loop5: partition table beyond EOD, truncated
03:46:40 executing program 0:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
r3 = socket$inet(0x2, 0x3, 0x7f)
r4 = socket$packet(0x11, 0x3, 0x300)
accept$packet(r0, &(0x7f0000001040)={0x11, 0x0, <r5=>0x0}, &(0x7f0000001080)=0x14)
setsockopt$inet_mreqn(r3, 0x0, 0x24, &(0x7f00000010c0)={@local, @remote, r5}, 0xc)
setsockopt$packet_fanout(r4, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r4, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000002c0)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000300)=0x10)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
ioctl$SIOCX25SFACILITIES(r0, 0x89e3, &(0x7f0000000040)={0x6a, 0x9, 0xb, 0x6, 0x0, 0x81})
connect$inet(r2, &(0x7f0000000200)={0x2, 0x4e24, @multicast1}, 0x10)
shutdown(r1, 0x1)
accept4$ax25(r1, &(0x7f0000000240)={{0x3, @netrom}, [@remote, @bcast, @bcast, @netrom, @default, @null, @netrom, @null]}, &(0x7f0000000080)=0x48, 0x80000)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)
setsockopt$inet_udp_int(r3, 0x11, 0x66, &(0x7f0000000100)=0x10000, 0x4)

[ 1037.182006] loop_reread_partitions: partition scan of loop5 () failed (rc=-5)
[ 1037.221599]  loop1: unable to read partition table
[ 1037.240784] loop1: partition table beyond EOD, truncated
[ 1037.260056] loop_reread_partitions: partition scan of loop1 () failed (rc=-5)
[ 1037.288907] __loop_clr_fd: partition scan of loop5 failed (rc=-22)
03:46:40 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e", 0x5a, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:46:40 executing program 5:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e", 0x5a, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

[ 1037.479796] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
[ 1037.523706] IPv6: : Disabled Multicast RS
03:46:40 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

[ 1037.647956] Dev loop5: unable to read RDB block 1
[ 1037.684626]  loop5: unable to read partition table
[ 1037.696547] loop5: partition table beyond EOD, truncated
[ 1037.737283] loop_reread_partitions: partition scan of loop5 () failed (rc=-5)
[ 1037.805956] Dev loop1: unable to read RDB block 1
03:46:40 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e", 0x5a, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1037.834862]  loop1: unable to read partition table
[ 1037.870284] __loop_clr_fd: partition scan of loop5 failed (rc=-22)
[ 1037.897429] loop1: partition table beyond EOD, truncated
[ 1037.964289] loop_reread_partitions: partition scan of loop1 () failed (rc=-5)
03:46:41 executing program 5 (fault-call:12 fault-nth:0):
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1038.020155] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
03:46:41 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e", 0x5a, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:46:41 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

[ 1038.186862] hfs: can't find a HFS filesystem on dev loop5
[ 1038.339457] FAULT_INJECTION: forcing a failure.
[ 1038.339457] name failslab, interval 1, probability 0, space 0, times 0
[ 1038.419398] CPU: 0 PID: 1245 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #86
[ 1038.426650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 1038.436023] Call Trace:
[ 1038.438657]  dump_stack+0x172/0x1f0
[ 1038.442317]  should_fail.cold+0xa/0x1b
[ 1038.446230]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[ 1038.451358]  ? lock_downgrade+0x810/0x810
[ 1038.455536]  ? ___might_sleep+0x163/0x280
[ 1038.459712]  __should_failslab+0x121/0x190
[ 1038.463971]  should_failslab+0x9/0x14
[ 1038.467793]  __kmalloc+0x2dc/0x740
[ 1038.471345]  ? __sanitizer_cov_trace_pc+0x3b/0x50
[ 1038.476205]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[ 1038.481759]  ? strnlen_user+0x1f0/0x280
[ 1038.485809]  ? __x64_sys_memfd_create+0x13c/0x470
[ 1038.490657]  __x64_sys_memfd_create+0x13c/0x470
[ 1038.495337]  ? memfd_fcntl+0x1550/0x1550
[ 1038.499408]  ? do_syscall_64+0x26/0x610
[ 1038.503382]  ? lockdep_hardirqs_on+0x415/0x5d0
[ 1038.507967]  ? trace_hardirqs_on+0x67/0x230
[ 1038.512290]  do_syscall_64+0x103/0x610
[ 1038.516194]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[ 1038.521379] RIP: 0033:0x457e29
[ 1038.524568] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[ 1038.543475] RSP: 002b:00007fa61890aa18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 1038.551186] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 0000000000457e29
[ 1038.558457] RDX: 0000000020000498 RSI: 0000000000000000 RDI: 00000000004bcb6b
[ 1038.565727] RBP: 0000000000000001 R08: 0000000008100000 R09: 0000000000000000
[ 1038.573011] R10: 0000000020000498 R11: 0000000000000246 R12: 0000000000000340
[ 1038.580300] R13: 00000000004bcb6b R14: 00000000004dc230 R15: 0000000000000008
[ 1038.605822] Dev loop1: unable to read RDB block 1
[ 1038.617062]  loop1: unable to read partition table
[ 1038.635361] loop1: partition table beyond EOD, truncated
[ 1038.653813] loop_reread_partitions: partition scan of loop1 () failed (rc=-5)
03:46:41 executing program 4:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00\x00\x00\x02\x00', @ifru_flags})

03:46:41 executing program 3:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x0)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

03:46:41 executing program 2 (fault-call:12 fault-nth:0):
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:46:41 executing program 0:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
ioctl$VHOST_SET_OWNER(r0, 0xaf01, 0x0)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x6, 0x40)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

03:46:41 executing program 5 (fault-call:12 fault-nth:1):
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1038.770863] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
[ 1038.861245] FAULT_INJECTION: forcing a failure.
[ 1038.861245] name failslab, interval 1, probability 0, space 0, times 0
[ 1038.874315] CPU: 1 PID: 1308 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #86
[ 1038.881541] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 1038.890924] Call Trace:
[ 1038.893529]  dump_stack+0x172/0x1f0
[ 1038.897170]  should_fail.cold+0xa/0x1b
[ 1038.901061]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[ 1038.906180]  ? lock_downgrade+0x810/0x810
[ 1038.910331]  ? ___might_sleep+0x163/0x280
[ 1038.914479]  __should_failslab+0x121/0x190
[ 1038.918713]  should_failslab+0x9/0x14
[ 1038.922514]  __kmalloc+0x2dc/0x740
[ 1038.926051]  ? audit_add_tree_rule.cold+0x3b/0x3b
[ 1038.930891]  ? strnlen_user+0x1f0/0x280
[ 1038.934863]  ? __x64_sys_memfd_create+0x13c/0x470
[ 1038.939706]  __x64_sys_memfd_create+0x13c/0x470
[ 1038.944386]  ? memfd_fcntl+0x1550/0x1550
[ 1038.948453]  ? do_syscall_64+0x26/0x610
[ 1038.952423]  ? lockdep_hardirqs_on+0x415/0x5d0
[ 1038.957003]  ? trace_hardirqs_on+0x67/0x230
[ 1038.961328]  do_syscall_64+0x103/0x610
[ 1038.965230]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[ 1038.970417] RIP: 0033:0x457e29
[ 1038.973607] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[ 1038.992504] RSP: 002b:00007f785cd4ba18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 1039.000212] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 0000000000457e29
03:46:42 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055", 0x5f, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

[ 1039.007476] RDX: 0000000020000498 RSI: 0000000000000000 RDI: 00000000004bcb6b
[ 1039.014740] RBP: 0000000000000001 R08: 0000000008100000 R09: 0000000000000000
[ 1039.022004] R10: 0000000020000498 R11: 0000000000000246 R12: 0000000000000340
[ 1039.029268] R13: 00000000004bcb6b R14: 00000000004dc230 R15: 0000000000000006
[ 1039.131493] hfs: can't find a HFS filesystem on dev loop5
[ 1039.143767] IPVS: ftp: loaded support on port[0] = 21
[ 1039.190937] FAULT_INJECTION: forcing a failure.
[ 1039.190937] name failslab, interval 1, probability 0, space 0, times 0
[ 1039.247775] Dev loop1: unable to read RDB block 1
[ 1039.258377]  loop1: unable to read partition table
[ 1039.271367] loop1: partition table beyond EOD, truncated
[ 1039.287072] loop_reread_partitions: partition scan of loop1 () failed (rc=-5)
[ 1039.387851] CPU: 1 PID: 1331 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #86
[ 1039.395089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 1039.404597] Call Trace:
[ 1039.407220]  dump_stack+0x172/0x1f0
[ 1039.410873]  should_fail.cold+0xa/0x1b
[ 1039.414788]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[ 1039.419913]  ? lock_downgrade+0x810/0x810
[ 1039.424086]  ? ___might_sleep+0x163/0x280
[ 1039.428256]  __should_failslab+0x121/0x190
[ 1039.432529]  ? shmem_destroy_callback+0xc0/0xc0
[ 1039.437220]  should_failslab+0x9/0x14
[ 1039.441036]  kmem_cache_alloc+0x2b2/0x6f0
[ 1039.445197]  ? __alloc_fd+0x430/0x530
[ 1039.449017]  ? shmem_destroy_callback+0xc0/0xc0
[ 1039.453701]  shmem_alloc_inode+0x1c/0x50
[ 1039.457779]  alloc_inode+0x66/0x190
[ 1039.461427]  new_inode_pseudo+0x19/0xf0
[ 1039.465417]  new_inode+0x1f/0x40
[ 1039.468801]  shmem_get_inode+0x84/0x780
[ 1039.472797]  __shmem_file_setup.part.0+0x7e/0x2b0
[ 1039.477665]  shmem_file_setup+0x66/0x90
[ 1039.481664]  __x64_sys_memfd_create+0x2a2/0x470
03:46:42 executing program 2 (fault-call:12 fault-nth:1):
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1039.486356]  ? memfd_fcntl+0x1550/0x1550
[ 1039.490436]  ? do_syscall_64+0x26/0x610
[ 1039.494424]  ? lockdep_hardirqs_on+0x415/0x5d0
[ 1039.499022]  ? trace_hardirqs_on+0x67/0x230
[ 1039.503370]  do_syscall_64+0x103/0x610
[ 1039.507285]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[ 1039.512485] RIP: 0033:0x457e29
[ 1039.515698] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
03:46:42 executing program 5 (fault-call:12 fault-nth:2):
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1039.534613] RSP: 002b:00007fa6188e9a18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 1039.542343] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 0000000000457e29
[ 1039.549646] RDX: 0000000020000498 RSI: 0000000000000000 RDI: 00000000004bcb6b
[ 1039.556934] RBP: 0000000000000001 R08: 0000000008100000 R09: 0000000000000000
[ 1039.564214] R10: 0000000020000498 R11: 0000000000000246 R12: 0000000000000340
[ 1039.571508] R13: 00000000004bcb6b R14: 00000000004dc230 R15: 0000000000000008
[ 1039.661749] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
03:46:42 executing program 3:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x0)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[ 1039.761580] FAULT_INJECTION: forcing a failure.
[ 1039.761580] name failslab, interval 1, probability 0, space 0, times 0
[ 1039.804587] hfs: can't find a HFS filesystem on dev loop5
[ 1039.830818] FAULT_INJECTION: forcing a failure.
[ 1039.830818] name failslab, interval 1, probability 0, space 0, times 0
[ 1039.867719] CPU: 1 PID: 1376 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #86
[ 1039.874952] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 1039.884713] Call Trace:
[ 1039.887325]  dump_stack+0x172/0x1f0
[ 1039.890986]  should_fail.cold+0xa/0x1b
[ 1039.894064] net_ratelimit: 20 callbacks suppressed
[ 1039.894071] protocol 88fb is buggy, dev hsr_slave_0
[ 1039.894884]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[ 1039.899839] protocol 88fb is buggy, dev hsr_slave_1
[ 1039.904820]  ? lock_downgrade+0x810/0x810
[ 1039.904837]  ? ___might_sleep+0x163/0x280
[ 1039.904853]  __should_failslab+0x121/0x190
[ 1039.904868]  should_failslab+0x9/0x14
[ 1039.904883]  kmem_cache_alloc+0x2b2/0x6f0
[ 1039.910053] protocol 88fb is buggy, dev hsr_slave_0
[ 1039.914985]  ? trace_hardirqs_on_caller+0x6a/0x220
[ 1039.915073]  ? ktime_get_coarse_real_ts64+0xf0/0x2b0
[ 1039.915094]  __d_alloc+0x2e/0x8c0
[ 1039.919250] protocol 88fb is buggy, dev hsr_slave_1
[ 1039.923377]  d_alloc_pseudo+0x1e/0x30
[ 1039.962920]  alloc_file_pseudo+0xe2/0x280
[ 1039.967080]  ? alloc_file+0x4d0/0x4d0
[ 1039.970894]  ? lockdep_annotate_inode_mutex_key+0x5b/0x70
[ 1039.976439]  ? kasan_check_write+0x14/0x20
[ 1039.980692]  __shmem_file_setup.part.0+0x108/0x2b0
[ 1039.985633]  shmem_file_setup+0x66/0x90
[ 1039.989620]  __x64_sys_memfd_create+0x2a2/0x470
[ 1039.994297]  ? memfd_fcntl+0x1550/0x1550
[ 1039.998376]  do_syscall_64+0x103/0x610
[ 1040.002272]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[ 1040.007478] RIP: 0033:0x457e29
[ 1040.010680] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[ 1040.029584] RSP: 002b:00007fa61890aa18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 1040.037297] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 0000000000457e29
[ 1040.044571] RDX: 0000000020000498 RSI: 0000000000000000 RDI: 00000000004bcb6b
[ 1040.052312] RBP: 0000000000000001 R08: 0000000008100000 R09: 0000000000000000
[ 1040.059593] R10: 0000000020000498 R11: 0000000000000246 R12: 0000000000000340
03:46:43 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

[ 1040.066877] R13: 00000000004bcb6b R14: 00000000004dc230 R15: 0000000000000008
[ 1040.074986] protocol 88fb is buggy, dev hsr_slave_0
[ 1040.077494] CPU: 0 PID: 1345 Comm: syz-executor.2 Not tainted 5.0.0-rc7+ #86
[ 1040.080547] protocol 88fb is buggy, dev hsr_slave_1
[ 1040.087230] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 1040.087236] Call Trace:
[ 1040.087259]  dump_stack+0x172/0x1f0
[ 1040.087278]  should_fail.cold+0xa/0x1b
[ 1040.087297]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[ 1040.087313]  ? lock_downgrade+0x810/0x810
[ 1040.087332]  ? ___might_sleep+0x163/0x280
[ 1040.087348]  __should_failslab+0x121/0x190
[ 1040.087364]  ? shmem_destroy_callback+0xc0/0xc0
[ 1040.101743]  should_failslab+0x9/0x14
[ 1040.101761]  kmem_cache_alloc+0x2b2/0x6f0
[ 1040.101780]  ? shmem_alloc_inode+0xb/0x50
[ 1040.101795]  ? shmem_destroy_callback+0xc0/0xc0
[ 1040.101810]  shmem_alloc_inode+0x1c/0x50
[ 1040.134428]  alloc_inode+0x66/0x190
[ 1040.134443]  new_inode_pseudo+0x19/0xf0
[ 1040.134465]  new_inode+0x1f/0x40
[ 1040.134481]  shmem_get_inode+0x84/0x780
[ 1040.134502]  __shmem_file_setup.part.0+0x7e/0x2b0
[ 1040.134522]  shmem_file_setup+0x66/0x90
[ 1040.179094]  __x64_sys_memfd_create+0x2a2/0x470
[ 1040.183789]  ? memfd_fcntl+0x1550/0x1550
[ 1040.187872]  ? do_syscall_64+0x26/0x610
[ 1040.191865]  ? lockdep_hardirqs_on+0x415/0x5d0
[ 1040.196468]  ? trace_hardirqs_on+0x67/0x230
[ 1040.196490]  do_syscall_64+0x103/0x610
[ 1040.196511]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[ 1040.196522] RIP: 0033:0x457e29
[ 1040.196536] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[ 1040.196545] RSP: 002b:00007f785cd4ba18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 1040.209927] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 0000000000457e29
[ 1040.209937] RDX: 0000000020000498 RSI: 0000000000000000 RDI: 00000000004bcb6b
[ 1040.209945] RBP: 0000000000000001 R08: 0000000008100000 R09: 0000000000000000
[ 1040.209953] R10: 0000000020000498 R11: 0000000000000246 R12: 0000000000000340
[ 1040.209963] R13: 00000000004bcb6b R14: 00000000004dc230 R15: 0000000000000006
[ 1040.308094] IPVS: ftp: loaded support on port[0] = 21
03:46:43 executing program 5 (fault-call:12 fault-nth:3):
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:46:43 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

[ 1040.614724] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
[ 1040.635942] hfs: can't find a HFS filesystem on dev loop5
[ 1040.656145] FAULT_INJECTION: forcing a failure.
[ 1040.656145] name failslab, interval 1, probability 0, space 0, times 0
[ 1040.694076] protocol 88fb is buggy, dev hsr_slave_0
[ 1040.699196] protocol 88fb is buggy, dev hsr_slave_1
[ 1040.741409] CPU: 0 PID: 1474 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #86
[ 1040.748648] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 1040.758026] Call Trace:
[ 1040.760639]  dump_stack+0x172/0x1f0
[ 1040.764293]  should_fail.cold+0xa/0x1b
[ 1040.768203]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[ 1040.773327]  ? lock_downgrade+0x810/0x810
[ 1040.777499]  ? ___might_sleep+0x163/0x280
[ 1040.781678]  __should_failslab+0x121/0x190
[ 1040.785935]  should_failslab+0x9/0x14
[ 1040.789757]  kmem_cache_alloc+0x2b2/0x6f0
[ 1040.793932]  __alloc_file+0x27/0x300
[ 1040.797676]  alloc_empty_file+0x72/0x170
[ 1040.801760]  alloc_file+0x5e/0x4d0
[ 1040.805325]  alloc_file_pseudo+0x189/0x280
[ 1040.809582]  ? alloc_file+0x4d0/0x4d0
[ 1040.813410]  ? kasan_check_write+0x14/0x20
[ 1040.817667]  __shmem_file_setup.part.0+0x108/0x2b0
[ 1040.822622]  shmem_file_setup+0x66/0x90
[ 1040.826616]  __x64_sys_memfd_create+0x2a2/0x470
[ 1040.831290]  ? memfd_fcntl+0x1550/0x1550
[ 1040.835362]  ? do_syscall_64+0x26/0x610
[ 1040.839357]  ? lockdep_hardirqs_on+0x415/0x5d0
[ 1040.843961]  ? trace_hardirqs_on+0x67/0x230
[ 1040.848304]  do_syscall_64+0x103/0x610
[ 1040.852211]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[ 1040.857425] RIP: 0033:0x457e29
[ 1040.860634] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[ 1040.879808] RSP: 002b:00007fa61890aa18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 1040.887539] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 0000000000457e29
[ 1040.894863] RDX: 0000000020000498 RSI: 0000000000000000 RDI: 00000000004bcb6b
[ 1040.902159] RBP: 0000000000000001 R08: 0000000008100000 R09: 0000000000000000
[ 1040.909451] R10: 0000000020000498 R11: 0000000000000246 R12: 0000000000000340
[ 1040.916742] R13: 00000000004bcb6b R14: 00000000004dc230 R15: 0000000000000008
[ 1040.934786] protocol 88fb is buggy, dev hsr_slave_0
[ 1040.940410] protocol 88fb is buggy, dev hsr_slave_1
03:46:44 executing program 4:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00\x00\x00\x03\x00', @ifru_flags})

03:46:44 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:46:44 executing program 0:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00')
sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000240)={0xf4, r4, 0x1c, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x40, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x14}}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x91}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}]}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xffffffff}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'batadv0\x00'}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xa6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x40}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x7}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x4}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x9}]}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x9}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}]}, 0xf4}, 0x1, 0x0, 0x0, 0x40}, 0x80)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

03:46:44 executing program 3:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x0)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[ 1041.345582] IPVS: ftp: loaded support on port[0] = 21
03:46:44 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x2, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:46:44 executing program 5 (fault-call:12 fault-nth:4):
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1041.470138] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
03:46:44 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

[ 1041.680113] FAULT_INJECTION: forcing a failure.
[ 1041.680113] name failslab, interval 1, probability 0, space 0, times 0
[ 1041.687253] hfs: can't find a HFS filesystem on dev loop5
[ 1041.805438] CPU: 0 PID: 1514 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #86
[ 1041.812674] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 1041.812680] Call Trace:
[ 1041.812704]  dump_stack+0x172/0x1f0
[ 1041.812725]  should_fail.cold+0xa/0x1b
[ 1041.812742]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[ 1041.812757]  ? lock_downgrade+0x810/0x810
[ 1041.812772]  ? ___might_sleep+0x163/0x280
[ 1041.812788]  __should_failslab+0x121/0x190
[ 1041.812806]  should_failslab+0x9/0x14
[ 1041.812821]  kmem_cache_alloc_trace+0x2d1/0x760
[ 1041.812833]  ? ___might_sleep+0x163/0x280
[ 1041.812849]  ? __might_sleep+0x95/0x190
[ 1041.828441]  apparmor_file_alloc_security+0x112/0x940
[ 1041.828467]  security_file_alloc+0x69/0xb0
[ 1041.828487]  __alloc_file+0xac/0x300
[ 1041.828502]  alloc_empty_file+0x72/0x170
[ 1041.828519]  alloc_file+0x5e/0x4d0
[ 1041.828537]  alloc_file_pseudo+0x189/0x280
[ 1041.828551]  ? alloc_file+0x4d0/0x4d0
[ 1041.828580]  ? lockdep_annotate_inode_mutex_key+0x5b/0x70
[ 1041.837563]  ? kasan_check_write+0x14/0x20
[ 1041.837592]  __shmem_file_setup.part.0+0x108/0x2b0
[ 1041.837610]  shmem_file_setup+0x66/0x90
[ 1041.837628]  __x64_sys_memfd_create+0x2a2/0x470
[ 1041.837645]  ? memfd_fcntl+0x1550/0x1550
[ 1041.837670]  do_syscall_64+0x103/0x610
[ 1041.837686]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[ 1041.837697] RIP: 0033:0x457e29
[ 1041.837710] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
03:46:45 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x3, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1041.837716] RSP: 002b:00007fa61890aa18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 1041.837730] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 0000000000457e29
[ 1041.837738] RDX: 0000000020000498 RSI: 0000000000000000 RDI: 00000000004bcb6b
[ 1041.837746] RBP: 0000000000000001 R08: 0000000008100000 R09: 0000000000000000
[ 1041.837754] R10: 0000000020000498 R11: 0000000000000246 R12: 0000000000000340
[ 1041.837762] R13: 00000000004bcb6b R14: 00000000004dc230 R15: 0000000000000008
03:46:45 executing program 3:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x0, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

03:46:45 executing program 5 (fault-call:12 fault-nth:5):
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1042.205243] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
03:46:45 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(0xffffffffffffffff, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

[ 1042.307648] hfs: can't find a HFS filesystem on dev loop5
[ 1042.453814] FAULT_INJECTION: forcing a failure.
[ 1042.453814] name failslab, interval 1, probability 0, space 0, times 0
[ 1042.536957] CPU: 1 PID: 1551 Comm: syz-executor.5 Not tainted 5.0.0-rc7+ #86
[ 1042.544199] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 1042.553576] Call Trace:
[ 1042.556194]  dump_stack+0x172/0x1f0
[ 1042.559850]  should_fail.cold+0xa/0x1b
[ 1042.563875]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[ 1042.569014]  ? lock_downgrade+0x810/0x810
[ 1042.573175]  ? ___might_sleep+0x163/0x280
[ 1042.577330]  __should_failslab+0x121/0x190
[ 1042.581584]  should_failslab+0x9/0x14
[ 1042.585408]  kmem_cache_alloc_trace+0x2d1/0x760
[ 1042.590097]  ? ___might_sleep+0x163/0x280
[ 1042.594267]  ? __might_sleep+0x95/0x190
[ 1042.598270]  apparmor_file_alloc_security+0x112/0x940
[ 1042.603570]  security_file_alloc+0x69/0xb0
[ 1042.607829]  __alloc_file+0xac/0x300
[ 1042.611559]  alloc_empty_file+0x72/0x170
[ 1042.615643]  alloc_file+0x5e/0x4d0
[ 1042.619206]  alloc_file_pseudo+0x189/0x280
[ 1042.623580]  ? alloc_file+0x4d0/0x4d0
[ 1042.627406]  ? lockdep_annotate_inode_mutex_key+0x5b/0x70
[ 1042.632966]  ? kasan_check_write+0x14/0x20
[ 1042.637240]  __shmem_file_setup.part.0+0x108/0x2b0
[ 1042.642195]  shmem_file_setup+0x66/0x90
[ 1042.646202]  __x64_sys_memfd_create+0x2a2/0x470
[ 1042.650894]  ? memfd_fcntl+0x1550/0x1550
[ 1042.654982]  do_syscall_64+0x103/0x610
[ 1042.658892]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[ 1042.664099] RIP: 0033:0x457e29
[ 1042.667304] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
03:46:45 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x4, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1042.686221] RSP: 002b:00007fa61890aa18 EFLAGS: 00000246 ORIG_RAX: 000000000000013f
[ 1042.693959] RAX: ffffffffffffffda RBX: 0000000020000480 RCX: 0000000000457e29
[ 1042.701264] RDX: 0000000020000498 RSI: 0000000000000000 RDI: 00000000004bcb6b
[ 1042.708543] RBP: 0000000000000001 R08: 0000000008100000 R09: 0000000000000000
[ 1042.715823] R10: 0000000020000498 R11: 0000000000000246 R12: 0000000000000340
[ 1042.723106] R13: 00000000004bcb6b R14: 00000000004dc230 R15: 0000000000000008
[ 1042.737841]  loop1: p1 < > p4
03:46:45 executing program 4:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00\x00\x00\x04\x00', @ifru_flags})

03:46:45 executing program 0:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r0, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
syz_emit_ethernet(0x7d, &(0x7f0000000040)={@random="a3bc124d9eb6", @random="d3fb56e52b0c", [{[{0x9100, 0x8, 0x6, 0x4}], {0x8100, 0xfb7e, 0x480efb9b}}], {@ipv4={0x800, {{0x10, 0x4, 0x695, 0x8, 0x67, 0x67, 0x4, 0x46, 0xf442eaaf6a35b75b, 0x0, @local, @broadcast, {[@rr={0x7, 0x1f, 0x7, [@empty, @multicast2, @broadcast, @loopback, @multicast2, @loopback, @remote]}, @end, @generic={0x44, 0x9, "45c38dec7badbf"}]}}, @udp={0x4e20, 0x4e23, 0x27, 0x0, [@guehdr={0x2, 0x4, 0x0, 0x8, 0x0, [0x80]}, @guehdr={0x2, 0x8, 0x1, 0x40, 0x100, [0x80]}], "4c740ce4ca641196a08908501b4f8a"}}}}}, &(0x7f0000000100)={0x1, 0x2, [0x37b, 0x2ec, 0x624, 0xd23]})
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[ 1042.762067] loop1: partition table partially beyond EOD, truncated
[ 1042.781350] loop1: p1 size 2 extends beyond EOD, truncated
[ 1042.818659] loop1: p4 start 1854537728 is beyond EOD, truncated
[ 1042.900141] IPVS: ftp: loaded support on port[0] = 21
[ 1042.912133] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
[ 1042.976127] print_req_error: 23 callbacks suppressed
[ 1042.976140] print_req_error: I/O error, dev loop1, sector 0 flags 80700
03:46:46 executing program 3:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x0, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

03:46:46 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(0xffffffffffffffff, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

[ 1043.081571] print_req_error: I/O error, dev loop1, sector 0 flags 0
[ 1043.088399] buffer_io_error: 20 callbacks suppressed
[ 1043.088408] Buffer I/O error on dev loop1p1, logical block 0, async page read
[ 1043.102272] print_req_error: I/O error, dev loop1, sector 0 flags 0
[ 1043.108927] Buffer I/O error on dev loop1p1, logical block 0, async page read
[ 1043.119717] print_req_error: I/O error, dev loop1, sector 0 flags 0
[ 1043.126422] Buffer I/O error on dev loop1p1, logical block 0, async page read
[ 1043.135177] print_req_error: I/O error, dev loop1, sector 0 flags 0
[ 1043.141845] Buffer I/O error on dev loop1p1, logical block 0, async page read
[ 1043.150158] print_req_error: I/O error, dev loop1, sector 0 flags 0
[ 1043.156812] Buffer I/O error on dev loop1p1, logical block 0, async page read
[ 1043.164974] print_req_error: I/O error, dev loop1, sector 0 flags 0
[ 1043.171621] Buffer I/O error on dev loop1p1, logical block 0, async page read
03:46:46 executing program 5:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:46:46 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x6, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1043.224946] print_req_error: I/O error, dev loop1, sector 0 flags 0
[ 1043.231414] Buffer I/O error on dev loop1p1, logical block 0, async page read
[ 1043.238914] print_req_error: I/O error, dev loop1, sector 0 flags 0
[ 1043.245415] Buffer I/O error on dev loop1p1, logical block 0, async page read
[ 1043.252863] print_req_error: I/O error, dev loop1, sector 0 flags 0
[ 1043.259381] Buffer I/O error on dev loop1p1, logical block 0, async page read
[ 1043.266879] Buffer I/O error on dev loop1p1, logical block 0, async page read
[ 1043.556919]  loop1: p1 < > p4
[ 1043.577784] loop1: partition table partially beyond EOD, truncated
[ 1043.622641] loop1: p1 size 2 extends beyond EOD, truncated
[ 1043.730061] loop1: p4 start 1854537728 is beyond EOD, truncated
03:46:46 executing program 5:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x2, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:46:46 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x7, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:46:47 executing program 0:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
sendto$inet(r0, &(0x7f0000000040)="7f8fbc20880f90670ab6f44c5ce79d33097c754c84d31848d025b92f9451e26e4f145a41b8ca929b882b7906cb5e6382c5b45dce3c74dbe162b7ee40fe62755d40d1df2c2d3e31adc5aca8cbd8083c95f675", 0x52, 0x0, 0x0, 0x0)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)
ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000100)={0x9, &(0x7f0000000240)=[{}, {}, {}, {}, {}, {}, {}, {}, {}]})
r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000007c0)='IPVS\x00')
sendmsg$IPVS_CMD_DEL_DEST(r1, &(0x7f0000000900)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000008c0)={&(0x7f0000000800)={0xa4, r4, 0x10, 0x70bd29, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x48, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x9}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@empty}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x3}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x100000000}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xc863}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8159}]}, 0xa4}}, 0x4000)

[ 1043.890865] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
[ 1043.948045] hfs: can't find a HFS filesystem on dev loop5
03:46:47 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(0xffffffffffffffff, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

[ 1044.159594]  loop5: p1 < > p4
[ 1044.178673] loop5: partition table partially beyond EOD, truncated
[ 1044.230869] IPv6: : Disabled Multicast RS
03:46:47 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x8, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1044.267410]  loop1: p1 < > p4
[ 1044.280625] loop1: partition table partially beyond EOD, truncated
03:46:47 executing program 3:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x0, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[ 1044.337013] loop5: p1 size 2 extends beyond EOD, truncated
[ 1044.345776] loop1: p1 size 2 extends beyond EOD, truncated
[ 1044.406036] loop1: p4 start 1854537728 is beyond EOD, truncated
[ 1044.433733] loop5: p4 start 1854537728 is beyond EOD, truncated
[ 1044.661694] __loop_clr_fd: partition scan of loop5 failed (rc=-22)
[ 1044.687257] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
03:46:47 executing program 4:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00\x00\x00\x05\x00', @ifru_flags})

03:46:47 executing program 5:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x3, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:46:47 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x10, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1044.848842] IPVS: ftp: loaded support on port[0] = 21
03:46:47 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0)
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

[ 1045.014340] hfs: can't find a HFS filesystem on dev loop5
03:46:48 executing program 0:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
connect$rds(r1, &(0x7f0000000080)={0x2, 0x4e20, @remote}, 0x10)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
ioctl$TIOCSWINSZ(r1, 0x5414, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$DRM_IOCTL_WAIT_VBLANK(r1, 0xc018643a, &(0x7f0000000040)={0x0, 0x3, 0x1c})
getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, 0x0, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[ 1045.094061] net_ratelimit: 16 callbacks suppressed
[ 1045.094069] protocol 88fb is buggy, dev hsr_slave_0
[ 1045.104236] protocol 88fb is buggy, dev hsr_slave_1
[ 1045.109375] protocol 88fb is buggy, dev hsr_slave_0
[ 1045.114474] protocol 88fb is buggy, dev hsr_slave_1
[ 1045.253625]  loop1: p1 < > p4
[ 1045.259926] loop1: partition table partially beyond EOD, truncated
03:46:48 executing program 3:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[ 1045.352410] loop1: p1 size 2 extends beyond EOD, truncated
[ 1045.375472]  loop5: p1 < > p4
[ 1045.394523] loop5: partition table partially beyond EOD, truncated
03:46:48 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x300, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1045.415445] loop1: p4 start 1854537728 is beyond EOD, truncated
[ 1045.421548] loop5: p1 size 2 extends beyond EOD, truncated
[ 1045.488546] loop5: p4 start 1854537728 is beyond EOD, truncated
[ 1045.625660] __loop_clr_fd: partition scan of loop5 failed (rc=-22)
[ 1045.679503] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
03:46:48 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x340, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:46:48 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0)
semctl$GETPID(0x0, 0x0, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

03:46:49 executing program 5:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x4, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1046.076438]  loop1: p1 < > p4
[ 1046.097124] hfs: can't find a HFS filesystem on dev loop5
[ 1046.119634] IPv6: : Disabled Multicast RS
[ 1046.124916] loop1: partition table partially beyond EOD, truncated
[ 1046.134098] protocol 88fb is buggy, dev hsr_slave_0
[ 1046.139253] protocol 88fb is buggy, dev hsr_slave_1
[ 1046.144408] protocol 88fb is buggy, dev hsr_slave_0
[ 1046.149474] protocol 88fb is buggy, dev hsr_slave_1
[ 1046.155486] loop1: p1 size 2 extends beyond EOD, truncated
[ 1046.163022] loop1: p4 start 1854537728 is beyond EOD, truncated
03:46:49 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x600, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1046.294035] protocol 88fb is buggy, dev hsr_slave_0
[ 1046.299260] protocol 88fb is buggy, dev hsr_slave_1
[ 1046.412223] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
[ 1046.421630] loop_reread_partitions: partition scan of loop5 () failed (rc=-16)
03:46:49 executing program 0:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x3, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:46:49 executing program 4:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00\x00\x00\x06\x00', @ifru_flags})

03:46:49 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0)
semctl$GETPID(0x0, 0x0, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

[ 1046.555468] __loop_clr_fd: partition scan of loop5 failed (rc=-22)
03:46:49 executing program 5:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x8, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:46:49 executing program 3:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[ 1046.717977] IPVS: ftp: loaded support on port[0] = 21
03:46:49 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x700, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1046.835244] loop_reread_partitions: partition scan of loop1 () failed (rc=-16)
03:46:50 executing program 0:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x3, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:46:50 executing program 5:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x9, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1047.164609] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
03:46:50 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x3f00, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:46:50 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0)
semctl$GETPID(0x0, 0x0, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

[ 1047.309545] hfs: can't find a HFS filesystem on dev loop5
03:46:50 executing program 0:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x3, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1047.534517]  loop5: p1 < > p4
[ 1047.545985]  loop1: p1 < > p4
[ 1047.554724] loop5: partition table partially beyond EOD, truncated
[ 1047.596643] loop5: p1 size 2 extends beyond EOD, truncated
[ 1047.604316] loop1: partition table partially beyond EOD, truncated
03:46:50 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x4003, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1047.646844] loop1: p1 size 2 extends beyond EOD, truncated
03:46:50 executing program 0:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x3f00, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1047.687176] loop5: p4 start 1854537728 is beyond EOD, truncated
[ 1047.690622] loop1: p4 start 1854537728 is beyond EOD, truncated
[ 1047.799769] __loop_clr_fd: partition scan of loop5 failed (rc=-22)
[ 1047.963885] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
[ 1048.071231] IPv6: : Disabled Multicast RS
03:46:51 executing program 4:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00\x00\x02\x06\x00', @ifru_flags})

03:46:51 executing program 3:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

03:46:51 executing program 5:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x10, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:46:51 executing program 0:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00\x00\x00\x04\x00', @ifru_flags})

03:46:51 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0)
semctl$GETPID(0x0, 0x3, 0xb, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

03:46:51 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x1000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1048.280444] IPVS: ftp: loaded support on port[0] = 21
[ 1048.329272] print_req_error: 45 callbacks suppressed
[ 1048.329283] print_req_error: I/O error, dev loop1, sector 0 flags 80700
[ 1048.345929] hfs: can't find a HFS filesystem on dev loop5
[ 1048.373890] print_req_error: I/O error, dev loop1, sector 0 flags 0
[ 1048.380582] buffer_io_error: 40 callbacks suppressed
[ 1048.380592] Buffer I/O error on dev loop1p1, logical block 0, async page read
[ 1048.387240] print_req_error: I/O error, dev loop1, sector 0 flags 0
[ 1048.393747] IPVS: ftp: loaded support on port[0] = 21
[ 1048.399981] Buffer I/O error on dev loop1p1, logical block 0, async page read
[ 1048.424429] print_req_error: I/O error, dev loop1, sector 0 flags 0
[ 1048.430938] Buffer I/O error on dev loop1p1, logical block 0, async page read
[ 1048.438516] print_req_error: I/O error, dev loop1, sector 0 flags 0
[ 1048.445037] Buffer I/O error on dev loop1p1, logical block 0, async page read
[ 1048.452616] print_req_error: I/O error, dev loop1, sector 0 flags 0
[ 1048.459243] Buffer I/O error on dev loop1p1, logical block 0, async page read
[ 1048.466775] print_req_error: I/O error, dev loop1, sector 0 flags 0
[ 1048.473195] Buffer I/O error on dev loop1p1, logical block 0, async page read
[ 1048.473327] print_req_error: I/O error, dev loop1, sector 0 flags 0
[ 1048.487875] Buffer I/O error on dev loop1p1, logical block 0, async page read
[ 1048.495369] print_req_error: I/O error, dev loop1, sector 0 flags 0
[ 1048.501798] Buffer I/O error on dev loop1p1, logical block 0, async page read
03:46:51 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x2000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1048.635422] print_req_error: I/O error, dev loop5, sector 0 flags 80700
[ 1048.646900]  loop1: p1 < > p4
[ 1048.650782] loop1: partition table partially beyond EOD, truncated
[ 1048.654321] Buffer I/O error on dev loop5p1, logical block 0, async page read
[ 1048.674134] Buffer I/O error on dev loop5p1, logical block 0, async page read
03:46:51 executing program 5:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x300, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1048.699571] loop1: p1 size 2 extends beyond EOD, truncated
[ 1048.769790] loop1: p4 start 1854537728 is beyond EOD, truncated
[ 1048.846634] hfs: can't find a HFS filesystem on dev loop5
[ 1048.896813] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
03:46:52 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x3000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:46:52 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0)
semctl$GETPID(0x0, 0x3, 0xb, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

[ 1049.164262]  loop5: p1 < > p4
[ 1049.189343] loop5: partition table partially beyond EOD, truncated
[ 1049.288718] loop5: p1 size 2 extends beyond EOD, truncated
[ 1049.344235] loop_reread_partitions: partition scan of loop1 () failed (rc=-16)
[ 1049.465464] loop5: p4 start 1854537728 is beyond EOD, truncated
03:46:52 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x4000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:46:52 executing program 3:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, 0x0, 0x0)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[ 1049.581730] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
[ 1049.593097] __loop_clr_fd: partition scan of loop5 failed (rc=-22)
[ 1049.691166] IPv6: : Disabled Multicast RS
[ 1049.863470] IPv6: : Disabled Multicast RS
03:46:53 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0)
semctl$GETPID(0x0, 0x3, 0xb, 0x0)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

03:46:53 executing program 5:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x340, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:46:53 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x6000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:46:53 executing program 4:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00\x00\x00\a\x00', @ifru_flags})

03:46:53 executing program 0:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x4003, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1050.147238] IPVS: ftp: loaded support on port[0] = 21
[ 1050.160035] hfs: can't find a HFS filesystem on dev loop5
[ 1050.227434]  loop1: p1 < > p4
[ 1050.231464] loop1: partition table partially beyond EOD, truncated
03:46:53 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x7000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1050.276104] loop1: p1 size 2 extends beyond EOD, truncated
[ 1050.294660] net_ratelimit: 14 callbacks suppressed
[ 1050.294669] protocol 88fb is buggy, dev hsr_slave_0
[ 1050.305667] protocol 88fb is buggy, dev hsr_slave_1
[ 1050.312358] protocol 88fb is buggy, dev hsr_slave_0
[ 1050.318394] protocol 88fb is buggy, dev hsr_slave_1
[ 1050.369463] loop1: p4 start 1854537728 is beyond EOD, truncated
03:46:53 executing program 5:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x900, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:46:53 executing program 3:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, 0x0, 0x0)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[ 1050.454096] protocol 88fb is buggy, dev hsr_slave_0
[ 1050.459247] protocol 88fb is buggy, dev hsr_slave_1
[ 1050.510160] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
03:46:53 executing program 0:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x4, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:46:53 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0)
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x2, 0x2)

[ 1050.686408] hfs: can't find a HFS filesystem on dev loop5
03:46:53 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x8000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1051.051622]  loop5: p1 < > p4
[ 1051.071287]  loop1: p1 < > p4
[ 1051.084219] loop5: partition table partially beyond EOD, truncated
[ 1051.090957] loop1: partition table partially beyond EOD, truncated
03:46:54 executing program 0:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

[ 1051.094060] protocol 88fb is buggy, dev hsr_slave_0
[ 1051.102375] protocol 88fb is buggy, dev hsr_slave_1
[ 1051.145935] loop1: p1 size 2 extends beyond EOD, truncated
[ 1051.190536] loop1: p4 start 1854537728 is beyond EOD, truncated
[ 1051.236836] loop5: p4 start 1854537728 is beyond EOD, truncated
03:46:54 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x10000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1051.334074] protocol 88fb is buggy, dev hsr_slave_0
[ 1051.339211] protocol 88fb is buggy, dev hsr_slave_1
03:46:54 executing program 3:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, 0x0, 0x0)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

03:46:54 executing program 0:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

[ 1051.412157] __loop_clr_fd: partition scan of loop5 failed (rc=-22)
[ 1051.508654] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
[ 1051.912014] IPv6: : Disabled Multicast RS
03:46:55 executing program 4:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00\x00\x00\b\x00', @ifru_flags})

03:46:55 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0)
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x2, 0x2)

03:46:55 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x3f000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:46:55 executing program 5:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x3f00, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:46:55 executing program 0:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)

[ 1052.343711] hfs: can't find a HFS filesystem on dev loop5
[ 1052.377602]  loop1: p1 < > p4
[ 1052.403888] loop1: partition table partially beyond EOD, truncated
03:46:55 executing program 3:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000), 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[ 1052.446837] IPVS: ftp: loaded support on port[0] = 21
[ 1052.457410] loop1: p1 size 2 extends beyond EOD, truncated
[ 1052.488018] loop1: p4 start 1854537728 is beyond EOD, 
[ 1052.488026] truncated
03:46:55 executing program 0:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x8000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:46:55 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x40030000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1052.612878] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
03:46:55 executing program 5:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x4000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:46:55 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0)
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x2, 0x2)

03:46:56 executing program 0:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x0)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[ 1052.995075] hfs: can't find a HFS filesystem on dev loop5
03:46:56 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0xf6ffffff, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1053.088150]  loop1: p1 < > p4
[ 1053.107208] loop1: partition table partially beyond EOD, truncated
[ 1053.152255] loop1: p1 size 2 extends beyond EOD, truncated
[ 1053.226623] loop1: p4 start 1854537728 is beyond EOD, truncated
[ 1053.505520] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
[ 1053.540592] print_req_error: 65 callbacks suppressed
[ 1053.540603] print_req_error: I/O error, dev loop1, sector 0 flags 80700
[ 1053.561085] print_req_error: I/O error, dev loop1, sector 0 flags 0
[ 1053.567952] buffer_io_error: 58 callbacks suppressed
[ 1053.567962] Buffer I/O error on dev loop1p1, logical block 0, async page read
[ 1053.573412] print_req_error: I/O error, dev loop1, sector 0 flags 0
[ 1053.588062] Buffer I/O error on dev loop1p1, logical block 0, async page read
[ 1053.598877] print_req_error: I/O error, dev loop1, sector 0 flags 0
[ 1053.605656] Buffer I/O error on dev loop1p1, logical block 0, async page read
[ 1053.613800] print_req_error: I/O error, dev loop1, sector 0 flags 0
[ 1053.620322] Buffer I/O error on dev loop1p1, logical block 0, async page read
[ 1053.629277] print_req_error: I/O error, dev loop1, sector 0 flags 0
[ 1053.636231] Buffer I/O error on dev loop1p1, logical block 0, async page read
[ 1053.644279] print_req_error: I/O error, dev loop1, sector 0 flags 0
[ 1053.650914] Buffer I/O error on dev loop1p1, logical block 0, async page read
[ 1053.659727] print_req_error: I/O error, dev loop1, sector 0 flags 0
[ 1053.666434] Buffer I/O error on dev loop1p1, logical block 0, async page read
[ 1053.675253] print_req_error: I/O error, dev loop1, sector 0 flags 0
[ 1053.681854] Buffer I/O error on dev loop1p1, logical block 0, async page read
[ 1053.689681] IPv6: : Disabled Multicast RS
[ 1053.690023] print_req_error: I/O error, dev loop1, sector 0 flags 0
[ 1053.700606] Buffer I/O error on dev loop1p1, logical block 0, async page read
[ 1053.708516] Buffer I/O error on dev loop1p1, logical block 0, async page read
03:46:56 executing program 3:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000), 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

03:46:56 executing program 5:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x4003, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:46:56 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0xfcfdffff, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:46:56 executing program 4:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00\x00\x03\b\x00', @ifru_flags})

03:46:56 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0)
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x0, 0x2)

03:46:57 executing program 0:
mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000280)='proc\x00', 0x80000000000000, 0x0)
r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0)
getdents64(r0, &(0x7f0000002400)=""/4096, 0xc8b7)

[ 1054.015043]  loop1: p1 < > p4
[ 1054.028943] IPVS: ftp: loaded support on port[0] = 21
[ 1054.038637] hfs: can't find a HFS filesystem on dev loop5
03:46:57 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0xfdfdffff, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1054.093097] loop1: partition table partially beyond EOD, truncated
[ 1054.136780] loop1: p1 size 2 extends beyond EOD, truncated
[ 1054.183518] loop1: p4 start 1854537728 is beyond EOD, truncated
[ 1054.312060]  loop5: p1 < > p4
03:46:57 executing program 0:
openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup/syz1\x00', 0x200002, 0x0)
fchdir(0xffffffffffffffff)
munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000)
r0 = fcntl$getown(0xffffffffffffffff, 0x9)
r1 = getpgid(r0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x8000, 0x0, 0x8, 0x0, 0xd0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x81, 0x101}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffffa}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f0000000080)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0)
r2 = open(&(0x7f00000000c0)='./file0\x00', 0x4, 0x0)
mkdirat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0)
removexattr(&(0x7f0000000140)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0xd1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x110, 0xffffffffffffffff, 0x8000000)
openat$fuse(0xffffffffffffff9c, &(0x7f0000000580)='/dev/fuse\x00', 0x2, 0x0)
ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000001140))
sched_setaffinity(0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x6}, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioprio_get$pid(0x2, r1)
capset(&(0x7f00000002c0)={0x19980330}, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x3, 0xca, 0xca30})
creat(&(0x7f0000000a00)='./file0/file0\x00', 0x44)
seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, 0x0})
fstatfs(r2, &(0x7f0000000400)=""/128)

[ 1054.413473] loop5: p4 start 1854537728 is beyond EOD, truncated
[ 1054.470885] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
[ 1054.550872] __loop_clr_fd: partition scan of loop5 failed (rc=-22)
03:46:57 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0)
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x0, 0x2)

03:46:57 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0xfeffffff, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:46:57 executing program 0:
openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000005c0)='./cgroup/syz1\x00', 0x200002, 0x0)
fchdir(0xffffffffffffffff)
munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000)
r0 = fcntl$getown(0xffffffffffffffff, 0x9)
r1 = getpgid(r0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x8000, 0x0, 0x8, 0x0, 0xd0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x81, 0x101}, 0x0, 0x0, 0x4, 0x0, 0x0, 0xfffffffffffffffa}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000100)='./file0\x00', 0x100000000000e002, 0x1, &(0x7f0000000040)=[{&(0x7f0000000080)="eb64c86d4f66732e66617400020441000500077008f80000d8c32d8cbe59628cf9d9ed7b2c", 0x25}], 0x0, 0x0)
r2 = open(&(0x7f00000000c0)='./file0\x00', 0x4, 0x0)
mkdirat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0)
removexattr(&(0x7f0000000140)='./file0\x00', 0x0)
perf_event_open(&(0x7f0000940000)={0x0, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0xd1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x110, 0xffffffffffffffff, 0x8000000)
openat$fuse(0xffffffffffffff9c, &(0x7f0000000580)='/dev/fuse\x00', 0x2, 0x0)
ioctl$FUSE_DEV_IOC_CLONE(r2, 0x8004e500, &(0x7f0000001140))
sched_setaffinity(0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, 0x20000000000000, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x6}, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioprio_get$pid(0x2, r1)
capset(&(0x7f00000002c0)={0x19980330}, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x3, 0xca, 0xca30})
creat(&(0x7f0000000a00)='./file0/file0\x00', 0x44)
seccomp(0x0, 0x0, &(0x7f0000000200)={0x0, 0x0})
fstatfs(r2, &(0x7f0000000400)=""/128)

03:46:58 executing program 5:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x1000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1055.046340]  loop1: p1 < > p4
[ 1055.068404] loop1: partition table partially beyond EOD, truncated
[ 1055.102421] hfs: can't find a HFS filesystem on dev loop5
03:46:58 executing program 3:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000), 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

03:46:58 executing program 0:
r0 = syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x0)
ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x0, 0x2, 0x0, 0xffefffffffffffff}})
openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer2\x00', 0x4800, 0x0)

[ 1055.139282] loop1: p1 size 2 extends beyond EOD, truncated
03:46:58 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0xfffffdfc, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1055.288067] loop1: p4 start 1854537728 is beyond EOD, truncated
[ 1055.494078] net_ratelimit: 14 callbacks suppressed
[ 1055.494086] protocol 88fb is buggy, dev hsr_slave_0
[ 1055.499117] protocol 88fb is buggy, dev hsr_slave_1
[ 1055.508627] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
[ 1055.509284] protocol 88fb is buggy, dev hsr_slave_0
[ 1055.520665] protocol 88fb is buggy, dev hsr_slave_1
[ 1055.563849]  loop5: p1 < > p4
[ 1055.604940] IPv6: : Disabled Multicast RS
[ 1055.693359] loop5: p4 start 1854537728 is beyond EOD, truncated
03:46:59 executing program 4:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00\x00\x00\n\x00', @ifru_flags})

03:46:59 executing program 0:
r0 = syz_open_dev$sndctrl(&(0x7f0000006000)='/dev/snd/controlC#\x00', 0x0, 0x0)
ioctl$SNDRV_CTL_IOCTL_PCM_PREFER_SUBDEVICE(r0, 0x40045532, &(0x7f00000001c0))
r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/audio\x00', 0x140202, 0x0)
r2 = syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x0, 0x405)
dup2(r2, r1)
io_setup(0x8, &(0x7f0000000080)=<r3=>0x0)
io_submit(r3, 0x1, &(0x7f0000000240)=[&(0x7f0000000200)={0x2, 0x0, 0x0, 0x1, 0x0, r1, 0x0}])

03:46:59 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0)
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x0, 0x2)

03:46:59 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0xfffffdfd, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1055.912431] __loop_clr_fd: partition scan of loop5 failed (rc=-22)
03:46:59 executing program 5:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x2000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1056.011907] IPVS: ftp: loaded support on port[0] = 21
03:46:59 executing program 0:
r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000080)={<r1=>0xffffffffffffffff})
socketpair$unix(0x1, 0x0, 0x0, 0x0)
openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x0, 0x0)
r2 = openat$cgroup_ro(r0, 0x0, 0x0, 0x0)
r3 = socket$kcm(0x29, 0x0, 0x0)
r4 = socket$kcm(0xa, 0x3, 0x11)
sendmsg$kcm(r4, &(0x7f00000027c0)={&(0x7f0000000280)=@nl=@unspec, 0x80, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="b8000000000000002900000039000000c902020100ff3a06fe80000000000000b87f25f8fba8cac171df2a488c992ef8b0264f3701c721001000000000000096d7733293fa6aaf6e76630f5e4fccdc3ecc2df4213ef4b493fe8f8a11a850b7340000000000000000111552f05ddb342e4c775364bcc31f2c4ed052bfc80010000000000000c2f52ef0f49558970f1bf0d7e400000000397608005ab3a3bfb87d7eb09576071f00d9c53b508e0ae7dbc2f3c7f32200000000"], 0xb8}, 0x0)
close(r1)
recvmsg$kcm(0xffffffffffffffff, 0x0, 0x0)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000300))
recvmsg$kcm(r2, &(0x7f000000d840)={0x0, 0x0, &(0x7f000000d700), 0x0, &(0x7f000000d740)=""/213, 0xd5}, 0x1)
bpf$PROG_LOAD(0x5, 0x0, 0x0)

03:46:59 executing program 3:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[ 1056.178733]  loop1: p1 < > p4
[ 1056.196892] loop1: partition table partially beyond EOD, truncated
[ 1056.215702] loop1: p1 size 2 extends beyond EOD, truncated
[ 1056.225439] hfs: can't find a HFS filesystem on dev loop5
03:46:59 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0xfffffff6, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1056.285494] loop1: p4 start 1854537728 is beyond EOD, truncated
03:46:59 executing program 0:
socketpair$unix(0x1, 0x0, 0x0, 0x0)
fcntl$getown(0xffffffffffffffff, 0x9)
clone(0x2102001fff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2)
ioctl$SG_IO(r0, 0x2285, &(0x7f00000003c0)={0x53, 0x0, 0x6, 0x0, @scatter={0x0, 0x40000, 0x0}, &(0x7f0000000580)="5f39203a1ec6", 0x0, 0x0, 0x0, 0x0, 0x0})
setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000300)=ANY=[@ANYBLOB], 0x1)
ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, 0x0)

[ 1056.443534]  loop5: p1 < > p4
[ 1056.491023] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
[ 1056.512213] loop5: p4 start 1854537728 is beyond EOD, truncated
[ 1056.534153] protocol 88fb is buggy, dev hsr_slave_0
[ 1056.539314] protocol 88fb is buggy, dev hsr_slave_1
[ 1056.544491] protocol 88fb is buggy, dev hsr_slave_0
[ 1056.549562] protocol 88fb is buggy, dev hsr_slave_1
03:46:59 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0)
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x0, 0x0)

[ 1056.634352] __loop_clr_fd: partition scan of loop5 failed (rc=-22)
[ 1056.704045] protocol 88fb is buggy, dev hsr_slave_0
[ 1056.709209] protocol 88fb is buggy, dev hsr_slave_1
03:46:59 executing program 5:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x3000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:47:00 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0xfffffffe, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1056.992473]  loop1: p1 < > p4
[ 1057.019914] loop1: partition table partially beyond EOD, truncated
[ 1057.061864] hfs: can't find a HFS filesystem on dev loop5
[ 1057.076376] loop1: p1 size 2 extends beyond EOD, truncated
[ 1057.135106] loop1: p4 start 1854537728 is beyond EOD, truncated
[ 1057.296956]  loop5: p1 < > p4
[ 1057.349376] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
[ 1057.359001] loop5: p4 start 1854537728 is beyond EOD, truncated
[ 1057.400326] IPv6: : Disabled Multicast RS
[ 1057.479050] __loop_clr_fd: partition scan of loop5 failed (rc=-22)
03:47:00 executing program 4:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00\x00\x03\x10\x00', @ifru_flags})

03:47:00 executing program 0:
r0 = getpid()
sched_setattr(r0, &(0x7f00000002c0)={0x0, 0x2, 0x0, 0x0, 0x3}, 0x0)
r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0)
r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0)
syz_kvm_setup_cpu$x86(r2, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000280)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0)
ioctl$KVM_CREATE_PIT2(r2, 0x4040ae77, &(0x7f0000000040))

03:47:00 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x225c17d03, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:47:00 executing program 3:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

03:47:00 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0)
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x0, 0x0)

03:47:00 executing program 5:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x4000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:47:00 executing program 0:

[ 1057.716499] IPVS: ftp: loaded support on port[0] = 21
[ 1057.775463]  loop1: p1 < > p4
[ 1057.798680] loop1: partition table partially beyond EOD, truncated
[ 1057.880330] hfs: can't find a HFS filesystem on dev loop5
[ 1057.894442] loop1: p1 size 2 extends beyond EOD, truncated
03:47:01 executing program 0:

03:47:01 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x1000000000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1057.955379] loop1: p4 start 1854537728 is beyond EOD, truncated
[ 1058.071149]  loop5: p1 < > p4
[ 1058.089846] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
03:47:01 executing program 1:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0)
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x0, 0x0)

03:47:01 executing program 0:

[ 1058.221900] loop5: p4 start 1854537728 is beyond EOD, truncated
03:47:01 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x7ffffffffffff, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1058.411691] loop_reread_partitions: partition scan of loop1 () failed (rc=-16)
[ 1058.590074] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
[ 1058.616640] __loop_clr_fd: partition scan of loop5 failed (rc=-22)
[ 1058.846036] IPv6: : Disabled Multicast RS
03:47:02 executing program 4:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00\x00\x01\x16\x00', @ifru_flags})

03:47:02 executing program 0:

03:47:02 executing program 1:

03:47:02 executing program 5:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x8000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:47:02 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x100000000000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:47:02 executing program 3:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000180)={0x1, &(0x7f00000001c0)=[{0x6, 0x0, 0x0, 0xfff}]}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[ 1059.048060] hfs: can't find a HFS filesystem on dev loop5
03:47:02 executing program 0:

[ 1059.098613] IPVS: ftp: loaded support on port[0] = 21
03:47:02 executing program 1:
r0 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0)
ioctl$DRM_IOCTL_SET_VERSION(r0, 0xc0106407, &(0x7f0000000080)={0x100000001, 0x2000000})

03:47:02 executing program 0:
r0 = socket$inet_tcp(0x2, 0x1, 0x0)
socket$inet_tcp(0x2, 0x1, 0x0)
ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0)
r1 = socket$netlink(0x10, 0x3, 0x0)
bind$netlink(r1, &(0x7f0000000340)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc)
setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4)
setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f00000003c0)=0x6, 0x4)
ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000080)={'lo\x00\x00\x00\x00\x04\x00\x00\x00\x00\x06\x00', 0xfd})

03:47:02 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x200000000000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1059.313680]  loop5: p1 < > p4
03:47:02 executing program 1:
r0 = socket$inet_udplite(0x2, 0x2, 0x88)
ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070")
r1 = socket$inet6(0xa, 0x80002, 0x0)
setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@mcast2, 0x800, 0x0, 0xff, 0x100000000000001}, 0xfffffd7e)
connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c)
r2 = accept(r1, &(0x7f0000000740)=@alg, &(0x7f00000007c0)=0x80)
setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f0000000800)=0x210000, 0x4)
r3 = getpid()
r4 = getuid()
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, <r5=>0x0}, &(0x7f0000000140)=0xc)
sendto(r2, &(0x7f0000000240)="ed852645ff9342bd9c31622a3ff64f2296bcdfd79ff823a963ae5651dafa33f27d36374daee61619dd49165610517a124b09c8af60e1b97e4534739bdd0af8f89d1754781db49a6637e1e677d9e9520a537c08d06c42467f3a7af9e5f1b268ad9a0e350bf563646864d210c214385adc2bb1fd2d506b88480ed71131ab073f8f7df6ec2b216800abb7ebf98ca113f20df6bf45474f5f7c3f3225995b777429d4a6ca5f1d1aa479f996a1bf379d1bef6c825a278ef33220dcd7e2ae590ba197b4f0a9ab51a094820c5d4b09e3e64a9b4e5a95cf13c172cd1e7b804fb55c0ed4621cef683209a4081ae1d3", 0xea, 0x40000, 0x0, 0x0)
setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={r3, r4, r5}, 0xc)
socketpair(0x1, 0x3, 0x6, &(0x7f00000001c0)={<r6=>0xffffffffffffffff})
bind$rds(r6, &(0x7f0000000200)={0x2, 0x4e21, @multicast1}, 0x10)
sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f000014f000)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0)
setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}, 0x800, 0x2}, 0x20)

[ 1059.391109] loop5: p4 start 1854537728 is beyond EOD, truncated
03:47:02 executing program 0:
fremovexattr(0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$key(0xf, 0x3, 0x2)
sendmsg$key(r0, &(0x7f0000cd0fc8)={0x0, 0x0, &(0x7f0000ca6000)={&(0x7f0000000000)={0x2, 0xd, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, [@sadb_x_policy={0x8, 0x12, 0x0, 0x3, 0x0, 0x0, 0x0, {0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @in, @in6=@mcast2}}, @sadb_address={0x5, 0x5, 0x0, 0xffffff7f, 0x0, @in6={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}}, @sadb_address={0x5, 0x6, 0x0, 0xffffff7f, 0x0, @in6={0xa, 0x0, 0x0, @remote={0xfe, 0x80, [0x0, 0x10], 0xffffffffffffffff}}}]}, 0xa0}}, 0x0)

[ 1059.523425] __loop_clr_fd: partition scan of loop5 failed (rc=-22)
[ 1060.073364] IPv6: : Disabled Multicast RS
03:47:03 executing program 4:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00\x00\x0f\x1a\x00', @ifru_flags})

03:47:03 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x300000000000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:47:03 executing program 5:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x9000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:47:03 executing program 1:
r0 = syz_open_dev$sndctrl(&(0x7f0000000680)='/dev/snd/controlC#\x00', 0x0, 0x0)
openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc1205531, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106}}, 0x20)
fcntl$getownex(r0, 0x10, &(0x7f00000004c0))
r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000680)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0)
write$RDMA_USER_CM_CMD_MIGRATE_ID(r2, &(0x7f0000000140)={0x12, 0x10, 0xfa00, {&(0x7f0000000100), 0xffffffffffffffff, r1}}, 0x18)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000006c0), &(0x7f0000000700)=0xc)
getsockopt$SO_COOKIE(0xffffffffffffffff, 0x1, 0x39, &(0x7f0000000500), &(0x7f0000000540)=0x8)
getgroups(0x3, &(0x7f0000000800)=[0xee00, 0x0, 0xee01])
socket$bt_hidp(0x1f, 0x3, 0x6)

03:47:03 executing program 0:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0)
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x0, 0x0)

03:47:03 executing program 3:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[ 1060.181002] print_req_error: 56 callbacks suppressed
[ 1060.181014] print_req_error: I/O error, dev loop5, sector 0 flags 80700
[ 1060.199187] print_req_error: I/O error, dev loop5, sector 0 flags 0
[ 1060.205694] buffer_io_error: 50 callbacks suppressed
[ 1060.205704] Buffer I/O error on dev loop5p1, logical block 0, async page read
[ 1060.223652] print_req_error: I/O error, dev loop5, sector 0 flags 0
[ 1060.230276] Buffer I/O error on dev loop5p1, logical block 0, async page read
[ 1060.260705] print_req_error: I/O error, dev loop5, sector 0 flags 0
[ 1060.267400] Buffer I/O error on dev loop5p1, logical block 0, async page read
[ 1060.275559] print_req_error: I/O error, dev loop5, sector 0 flags 0
[ 1060.282108] Buffer I/O error on dev loop5p1, logical block 0, async page read
[ 1060.290179] print_req_error: I/O error, dev loop5, sector 0 flags 0
[ 1060.296767] Buffer I/O error on dev loop5p1, logical block 0, async page read
[ 1060.304259] print_req_error: I/O error, dev loop5, sector 0 flags 0
[ 1060.317908] Buffer I/O error on dev loop5p1, logical block 0, async page read
[ 1060.325657] print_req_error: I/O error, dev loop5, sector 0 flags 0
[ 1060.332200] Buffer I/O error on dev loop5p1, logical block 0, async page read
[ 1060.339833] print_req_error: I/O error, dev loop5, sector 0 flags 0
[ 1060.346422] Buffer I/O error on dev loop5p1, logical block 0, async page read
[ 1060.354013] print_req_error: I/O error, dev loop5, sector 0 flags 0
[ 1060.360577] Buffer I/O error on dev loop5p1, logical block 0, async page read
[ 1060.368200] Buffer I/O error on dev loop5p1, logical block 0, async page read
03:47:03 executing program 0:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0)
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x0, 0x0)

[ 1060.392932] IPVS: ftp: loaded support on port[0] = 21
03:47:03 executing program 1:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00\x00\x00\b\x00', @ifru_flags})

[ 1060.575227]  loop5: p1 < > p4
03:47:03 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x37dc12502000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:47:03 executing program 0:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0)
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x0, 0x0)

[ 1060.616255] loop5: p4 start 1854537728 is beyond EOD, truncated
[ 1060.695658] net_ratelimit: 12 callbacks suppressed
[ 1060.695733] protocol 88fb is buggy, dev hsr_slave_0
[ 1060.706595] protocol 88fb is buggy, dev hsr_slave_1
[ 1060.713435] protocol 88fb is buggy, dev hsr_slave_0
[ 1060.719303] protocol 88fb is buggy, dev hsr_slave_1
[ 1060.729734] IPVS: ftp: loaded support on port[0] = 21
[ 1060.790424] __loop_clr_fd: partition scan of loop5 failed (rc=-22)
[ 1060.854090] protocol 88fb is buggy, dev hsr_slave_0
[ 1060.859271] protocol 88fb is buggy, dev hsr_slave_1
03:47:04 executing program 0 (fault-call:5 fault-nth:0):
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0)
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x0, 0x2)

03:47:04 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x400000000000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1061.507311] IPv6: : Disabled Multicast RS
03:47:04 executing program 4:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00\x00\x00\x1f\x00', @ifru_flags})

03:47:04 executing program 5:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x10000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:47:04 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x600000000000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:47:04 executing program 0:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0)
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x0, 0x2)

03:47:04 executing program 3:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[ 1061.704353] IPv6: : Disabled Multicast RS
[ 1061.833888] IPVS: ftp: loaded support on port[0] = 21
03:47:04 executing program 0:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x2, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0)
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x0, 0x2)

[ 1061.861513] hfs: can't find a HFS filesystem on dev loop5
03:47:05 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x700000000000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:47:05 executing program 1:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x37dc12502000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:47:05 executing program 0:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x3, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0)
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x0, 0x2)

03:47:05 executing program 0:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x4, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0)
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x0, 0x2)

[ 1062.331830] hfs: can't find a HFS filesystem on dev loop1
03:47:05 executing program 5:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x3f000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:47:05 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x800000000000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1062.570429] hfs: can't find a HFS filesystem on dev loop5
[ 1062.625386]  loop1: p1 < > p4
[ 1062.685748] loop1: p4 start 1854537728 is beyond EOD, truncated
[ 1062.786874]  loop5: p1 < > p4
[ 1062.849461] __loop_clr_fd: partition scan of loop1 failed (rc=-22)
[ 1062.867087] IPv6: : Disabled Multicast RS
[ 1062.886590] loop5: p4 start 1854537728 is beyond EOD, truncated
[ 1063.053203] __loop_clr_fd: partition scan of loop5 failed (rc=-22)
[ 1063.223438] hfs: can't find a HFS filesystem on dev loop5
03:47:06 executing program 0:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x5, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0)
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x0, 0x2)

03:47:06 executing program 3:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, 0x0, 0x0)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

03:47:06 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x1000000000000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:47:06 executing program 1 (fault-call:2 fault-nth:0):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$rxrpc(0x21, 0x2, 0xa)
setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f0000000100)='/dev/kvm\x00', 0x9)

03:47:06 executing program 5:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x40000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:47:06 executing program 4:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00\x00\x00 \x00', @ifru_flags})

[ 1063.507413] FAULT_INJECTION: forcing a failure.
[ 1063.507413] name failslab, interval 1, probability 0, space 0, times 0
[ 1063.564226] hfs: can't find a HFS filesystem on dev loop5
[ 1063.574132] protocol 88fb is buggy, dev hsr_slave_0
[ 1063.579268] protocol 88fb is buggy, dev hsr_slave_1
[ 1063.625787] CPU: 1 PID: 3082 Comm: syz-executor.1 Not tainted 5.0.0-rc7+ #86
[ 1063.633027] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 1063.642396] Call Trace:
[ 1063.645013]  dump_stack+0x172/0x1f0
[ 1063.648664]  should_fail.cold+0xa/0x1b
[ 1063.652576]  ? fault_create_debugfs_attr+0x1e0/0x1e0
[ 1063.657700]  ? lock_downgrade+0x810/0x810
[ 1063.661876]  ? ___might_sleep+0x163/0x280
[ 1063.666049]  __should_failslab+0x121/0x190
[ 1063.670306]  should_failslab+0x9/0x14
[ 1063.674130]  __kmalloc_track_caller+0x2d8/0x740
[ 1063.678820]  ? __local_bh_enable_ip+0x15a/0x270
[ 1063.683514]  ? lockdep_hardirqs_on+0x415/0x5d0
[ 1063.688118]  ? lock_sock_nested+0x9a/0x120
[ 1063.692383]  ? trace_hardirqs_on+0x67/0x230
[ 1063.696871]  ? rxrpc_request_key+0x48/0x110
[ 1063.701230]  memdup_user_nul+0x26/0x130
[ 1063.705230]  rxrpc_request_key+0x48/0x110
[ 1063.709399]  rxrpc_setsockopt+0x67d/0x740
[ 1063.713671]  ? rxrpc_getsockopt+0x140/0x140
[ 1063.718015]  ? apparmor_socket_setsockopt+0x22/0x30
[ 1063.723049]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[ 1063.728610]  ? security_socket_setsockopt+0x93/0xc0
[ 1063.733646]  __sys_setsockopt+0x180/0x280
[ 1063.736941] IPVS: ftp: loaded support on port[0] = 21
[ 1063.737801]  ? kernel_accept+0x310/0x310
[ 1063.747074]  ? trace_hardirqs_on_thunk+0x1a/0x1c
[ 1063.751850]  ? do_syscall_64+0x26/0x610
[ 1063.755836]  ? entry_SYSCALL_64_after_hwframe+0x49/0xbe
[ 1063.761199]  ? do_syscall_64+0x26/0x610
[ 1063.765190]  __x64_sys_setsockopt+0xbe/0x150
[ 1063.769618]  do_syscall_64+0x103/0x610
[ 1063.773527]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[ 1063.778729] RIP: 0033:0x457e29
[ 1063.781936] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00
[ 1063.800961] RSP: 002b:00007f478a47cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036
[ 1063.808687] RAX: ffffffffffffffda RBX: 00007f478a47cc90 RCX: 0000000000457e29
[ 1063.815970] RDX: 0000000000000001 RSI: 0000000000000110 RDI: 0000000000000004
03:47:06 executing program 0:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x8, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0)
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x0, 0x2)

[ 1063.823354] RBP: 000000000073bf00 R08: 0000000000000009 R09: 0000000000000000
[ 1063.830641] R10: 0000000020000100 R11: 0000000000000246 R12: 00007f478a47d6d4
[ 1063.837924] R13: 00000000004c5831 R14: 00000000004d9a40 R15: 0000000000000005
[ 1063.845535] protocol 88fb is buggy, dev hsr_slave_0
[ 1063.850612] protocol 88fb is buggy, dev hsr_slave_1
03:47:07 executing program 1 (fault-call:2 fault-nth:1):
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$rxrpc(0x21, 0x2, 0xa)
setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f0000000100)='/dev/kvm\x00', 0x9)

03:47:07 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x3f00000000000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1063.983744]  loop5: p1 < > p4
03:47:07 executing program 0:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x10, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0)
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x0, 0x2)

[ 1064.035784] loop5: p4 start 1854537728 is beyond EOD, truncated
03:47:07 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$rxrpc(0x21, 0x2, 0xa)
setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f0000000100)='/dev/kvm\x00', 0x9)

[ 1064.197023] __loop_clr_fd: partition scan of loop5 failed (rc=-22)
03:47:07 executing program 0:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x300, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0)
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x0, 0x2)

03:47:07 executing program 3:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x0, 0x0}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

03:47:07 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$rxrpc(0x21, 0x2, 0xa)
setsockopt$RXRPC_SECURITY_KEY(r0, 0x10f, 0x1, &(0x7f0000000100)='/dev/kvm\x00', 0x9)

03:47:07 executing program 5:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x40030000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:47:07 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x4003000000000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:47:07 executing program 0:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x340, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0)
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x0, 0x2)

[ 1064.714187] hfs: can't find a HFS filesystem on dev loop5
[ 1064.931924]  loop5: p1 < > p4
03:47:08 executing program 4:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00\x00\x01&\x00', @ifru_flags})

03:47:08 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$rxrpc(0x21, 0x2, 0xa)
setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x2, &(0x7f0000000100)='/dev/kvm\x00', 0x9)

03:47:08 executing program 0:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x500, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0)
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x0, 0x2)

03:47:08 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x8000000000000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1065.008484] loop5: p4 start 1854537728 is beyond EOD, truncated
[ 1065.126543] IPVS: ftp: loaded support on port[0] = 21
03:47:08 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$rxrpc(0x21, 0x2, 0xa)
setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x3, &(0x7f0000000100)='/dev/kvm\x00', 0x9)

[ 1065.161932] __loop_clr_fd: partition scan of loop5 failed (rc=-22)
03:47:08 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$rxrpc(0x21, 0x2, 0xa)
setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x4, &(0x7f0000000100)='/dev/kvm\x00', 0x9)

03:47:08 executing program 0:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x3f00, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0)
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x0, 0x2)

[ 1065.694840] print_req_error: 34 callbacks suppressed
[ 1065.694852] print_req_error: I/O error, dev loop5, sector 0 flags 80700
03:47:08 executing program 3:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x0, 0x0}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

03:47:08 executing program 5:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0xf6ffffff, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:47:08 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$rxrpc(0x21, 0x2, 0xa)
setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x5, &(0x7f0000000100)='/dev/kvm\x00', 0x9)

03:47:08 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0xf6ffffff00000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:47:08 executing program 0:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x4003, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0)
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x0, 0x2)

[ 1065.744234] print_req_error: I/O error, dev loop5, sector 0 flags 0
[ 1065.750882] buffer_io_error: 30 callbacks suppressed
[ 1065.750893] Buffer I/O error on dev loop5p1, logical block 0, async page read
[ 1065.766165] print_req_error: I/O error, dev loop5, sector 0 flags 0
[ 1065.772974] Buffer I/O error on dev loop5p1, logical block 0, async page read
[ 1065.791717] print_req_error: I/O error, dev loop5, sector 0 flags 0
[ 1065.798438] Buffer I/O error on dev loop5p1, logical block 0, async page read
[ 1065.806708] print_req_error: I/O error, dev loop5, sector 0 flags 0
[ 1065.813358] Buffer I/O error on dev loop5p1, logical block 0, async page read
[ 1065.822931] print_req_error: I/O error, dev loop5, sector 0 flags 0
[ 1065.829502] Buffer I/O error on dev loop5p1, logical block 0, async page read
[ 1065.837531] print_req_error: I/O error, dev loop5, sector 0 flags 0
[ 1065.844121] Buffer I/O error on dev loop5p1, logical block 0, async page read
[ 1066.266571] IPv6: : Disabled Multicast RS
03:47:09 executing program 4:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00\x00\x03*\x00', @ifru_flags})

03:47:09 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$rxrpc(0x21, 0x2, 0xa)
setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0xf, &(0x7f0000000100)='/dev/kvm\x00', 0x9)

03:47:09 executing program 0:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x1000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0)
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x0, 0x2)

03:47:09 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0xfcfdffff00000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:47:09 executing program 5:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0xfcfdffff, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1066.508799] hfs: can't find a HFS filesystem on dev loop5
[ 1066.591487] IPVS: ftp: loaded support on port[0] = 21
03:47:09 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$rxrpc(0x21, 0x2, 0xa)
setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x10, &(0x7f0000000100)='/dev/kvm\x00', 0x9)

[ 1066.739199] 
[ 1066.740905] ======================================================
[ 1066.747243] WARNING: possible circular locking dependency detected
[ 1066.753567] 5.0.0-rc7+ #86 Not tainted
[ 1066.757468] ------------------------------------------------------
[ 1066.763796] syz-executor.0/3291 is trying to acquire lock:
[ 1066.769419] 00000000e83d0081 (&mm->mmap_sem){++++}, at: __do_page_fault+0x9c2/0xd60
[ 1066.777340] 
[ 1066.777340] but task is already holding lock:
[ 1066.783314] 000000009691b69b (&sb->s_type->i_mutex_key#12){+.+.}, at: generic_file_write_iter+0xdf/0x610
[ 1066.793036] 
[ 1066.793036] which lock already depends on the new lock.
[ 1066.793036] 
[ 1066.801358] 
[ 1066.801358] the existing dependency chain (in reverse order) is:
[ 1066.808989] 
[ 1066.808989] -> #2 (&sb->s_type->i_mutex_key#12){+.+.}:
[ 1066.815780]        down_write+0x38/0x90
[ 1066.819771]        shmem_fallocate+0x15a/0xc60
[ 1066.824475]        ashmem_shrink_scan+0x1d7/0x4f0
[ 1066.829337]        ashmem_ioctl+0x2f0/0x11a0
[ 1066.833766]        do_vfs_ioctl+0xd6e/0x1390
[ 1066.838189]        ksys_ioctl+0xab/0xd0
[ 1066.842183]        __x64_sys_ioctl+0x73/0xb0
[ 1066.846605]        do_syscall_64+0x103/0x610
[ 1066.851025]        entry_SYSCALL_64_after_hwframe+0x49/0xbe
[ 1066.856736] 
[ 1066.856736] -> #1 (ashmem_mutex){+.+.}:
[ 1066.862212]        __mutex_lock+0xf7/0x1310
[ 1066.866546]        mutex_lock_nested+0x16/0x20
[ 1066.871141]        ashmem_mmap+0x55/0x520
[ 1066.875314]        mmap_region+0xc37/0x1760
[ 1066.879736]        do_mmap+0x8e2/0x1080
[ 1066.883721]        vm_mmap_pgoff+0x1c5/0x230
[ 1066.888156]        ksys_mmap_pgoff+0x4aa/0x630
[ 1066.892784]        __x64_sys_mmap+0xe9/0x1b0
[ 1066.897203]        do_syscall_64+0x103/0x610
[ 1066.901623]        entry_SYSCALL_64_after_hwframe+0x49/0xbe
[ 1066.907332] 
[ 1066.907332] -> #0 (&mm->mmap_sem){++++}:
[ 1066.912891]        lock_acquire+0x16f/0x3f0
[ 1066.917229]        down_read+0x3b/0x90
[ 1066.921137]        __do_page_fault+0x9c2/0xd60
[ 1066.925745]        do_page_fault+0x71/0x581
[ 1066.930079]        page_fault+0x1e/0x30
[ 1066.934072]        iov_iter_fault_in_readable+0x1ba/0x450
[ 1066.939624]        generic_perform_write+0x195/0x530
[ 1066.944741]        __generic_file_write_iter+0x25e/0x630
[ 1066.950202]        generic_file_write_iter+0x360/0x610
[ 1066.955498]        __vfs_write+0x613/0x8e0
[ 1066.959750]        vfs_write+0x20c/0x580
[ 1066.963824]        ksys_pwrite64+0x183/0x1c0
[ 1066.968243]        __x64_sys_pwrite64+0x97/0xf0
[ 1066.972925]        do_syscall_64+0x103/0x610
[ 1066.977346]        entry_SYSCALL_64_after_hwframe+0x49/0xbe
[ 1066.983060] 
[ 1066.983060] other info that might help us debug this:
[ 1066.983060] 
[ 1066.991214] Chain exists of:
[ 1066.991214]   &mm->mmap_sem --> ashmem_mutex --> &sb->s_type->i_mutex_key#12
[ 1066.991214] 
[ 1067.002763]  Possible unsafe locking scenario:
[ 1067.002763] 
[ 1067.008839]        CPU0                    CPU1
[ 1067.013515]        ----                    ----
[ 1067.018190]   lock(&sb->s_type->i_mutex_key#12);
[ 1067.022953]                                lock(ashmem_mutex);
[ 1067.028927]                                lock(&sb->s_type->i_mutex_key#12);
[ 1067.036206]   lock(&mm->mmap_sem);
[ 1067.039752] 
[ 1067.039752]  *** DEADLOCK ***
[ 1067.039752] 
[ 1067.046187] 2 locks held by syz-executor.0/3291:
[ 1067.050946]  #0: 00000000c2b3c2f5 (sb_writers#5){.+.+}, at: vfs_write+0x429/0x580
[ 1067.058600]  #1: 000000009691b69b (&sb->s_type->i_mutex_key#12){+.+.}, at: generic_file_write_iter+0xdf/0x610
[ 1067.068683] 
[ 1067.068683] stack backtrace:
[ 1067.073191] CPU: 0 PID: 3291 Comm: syz-executor.0 Not tainted 5.0.0-rc7+ #86
[ 1067.080385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[ 1067.089756] Call Trace:
[ 1067.092361]  dump_stack+0x172/0x1f0
[ 1067.096008]  print_circular_bug.isra.0.cold+0x1cc/0x28f
[ 1067.101385]  __lock_acquire+0x2f00/0x4700
[ 1067.105557]  ? fixup_exception+0xad/0xe0
[ 1067.109637]  ? mark_held_locks+0x100/0x100
[ 1067.113889]  ? pgtable_bad+0x90/0x90
[ 1067.117610]  ? mark_held_locks+0x100/0x100
[ 1067.121854]  ? __lock_is_held+0xb6/0x140
[ 1067.125927]  lock_acquire+0x16f/0x3f0
[ 1067.129735]  ? __do_page_fault+0x9c2/0xd60
[ 1067.133979]  down_read+0x3b/0x90
[ 1067.137356]  ? __do_page_fault+0x9c2/0xd60
[ 1067.141600]  __do_page_fault+0x9c2/0xd60
[ 1067.145670]  do_page_fault+0x71/0x581
[ 1067.149530]  page_fault+0x1e/0x30
[ 1067.153248] RIP: 0010:iov_iter_fault_in_readable+0x1ba/0x450
[ 1067.159053] Code: 4c 39 f3 76 17 eb 3b e8 54 2c 47 fe 48 81 c3 00 10 00 00 48 39 9d 68 ff ff ff 72 2d e8 3f 2c 47 fe 0f 1f 00 0f ae e8 45 31 f6 <8a> 13 0f 1f 00 31 ff 44 89 f6 41 88 57 d0 e8 a3 2d 47 fe 45 85 f6
[ 1067.177966] RSP: 0018:ffff88808cc7f9b8 EFLAGS: 00010246
[ 1067.183341] RAX: 0000000000040000 RBX: 0000000020010000 RCX: ffffc90005deb000
[ 1067.190621] RDX: 000000000000234e RSI: ffffffff8328b541 RDI: 0000000000000005
[ 1067.197890] RBP: ffff88808cc7fa58 R08: ffff888098520340 R09: fffff9400037977f
[ 1067.205212] R10: fffff9400037977e R11: ffffea0001bcbbf7 R12: 0000000000000060
[ 1067.212578] R13: 0000000000000060 R14: 0000000000000000 R15: ffff88808cc7fa30
[ 1067.219855]  ? iov_iter_fault_in_readable+0x1b1/0x450
[ 1067.225060]  ? iov_iter_fault_in_readable+0x1b1/0x450
[ 1067.230261]  ? copy_page_from_iter+0x750/0x750
[ 1067.234844]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[ 1067.240395]  generic_perform_write+0x195/0x530
[ 1067.244989]  ? page_endio+0x780/0x780
[ 1067.248792]  ? current_time+0x140/0x140
[ 1067.252765]  ? retint_kernel+0x2d/0x2d
[ 1067.256652]  __generic_file_write_iter+0x25e/0x630
[ 1067.261587]  ? __sanitizer_cov_trace_cmp8+0x18/0x20
[ 1067.266606]  generic_file_write_iter+0x360/0x610
[ 1067.271374]  ? __generic_file_write_iter+0x630/0x630
[ 1067.276490]  ? __sanitizer_cov_trace_const_cmp8+0x18/0x20
[ 1067.282032]  ? iov_iter_init+0xea/0x220
[ 1067.286022]  __vfs_write+0x613/0x8e0
[ 1067.289733]  ? kernel_read+0x120/0x120
[ 1067.293622]  ? rcu_read_lock_sched_held+0x110/0x130
[ 1067.298634]  ? rcu_sync_lockdep_assert+0x73/0xb0
[ 1067.303394]  ? __sanitizer_cov_trace_const_cmp4+0x16/0x20
[ 1067.308932]  ? __sb_start_write+0x1ac/0x360
[ 1067.313258]  vfs_write+0x20c/0x580
[ 1067.316799]  ksys_pwrite64+0x183/0x1c0
[ 1067.320683]  ? __ia32_sys_pread64+0xf0/0xf0
[ 1067.324997]  ? retint_kernel+0x2d/0x2d
[ 1067.328890]  __x64_sys_pwrite64+0x97/0xf0
[ 1067.333041]  ? do_syscall_64+0x5b/0x610
[ 1067.337014]  do_syscall_64+0x103/0x610
[ 1067.340898]  entry_SYSCALL_64_after_hwframe+0x49/0xbe
[ 1067.346080] RIP: 0033:0x411f77
[ 1067.349271] Code: 12 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 51 17 00 00 c3 48 83 ec 08 e8 c7 f9 ff ff 48 89 04 24 49 89 ca b8 12 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 0d fa ff ff 48 89 d0 48 83 c4 08 48 3d 01
[ 1067.355266] IPVS: ftp: loaded support on port[0] = 21
[ 1067.368171] RSP: 002b:00007fb23b585a10 EFLAGS: 00000293 ORIG_RAX: 0000000000000012
[ 1067.368182] RAX: ffffffffffffffda RBX: 0000000020000490 RCX: 0000000000411f77
03:47:10 executing program 3:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x0, 0x0}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[ 1067.368189] RDX: 0000000000000060 RSI: 0000000020010000 RDI: 0000000000000005
[ 1067.368195] RBP: 0000000000000001 R08: 0000000008100000 R09: 0000000000000000
[ 1067.368202] R10: 00000000000001a0 R11: 0000000000000293 R12: 00007fb23b5866d4
[ 1067.368209] R13: 0000000000000005 R14: 0000000000000005 R15: 0000000000000000
[ 1067.370378] kobject: 'tx-0' (0000000098aca43f): kobject_add_internal: parent: 'queues', set: 'queues'
[ 1067.410774] kobject: 'loop3' (0000000063865547): kobject_uevent_env
03:47:10 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$rxrpc(0x21, 0x2, 0xa)
setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0xffffff1f, &(0x7f0000000100)='/dev/kvm\x00', 0x9)

03:47:10 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0xfdfdffff00000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1067.445937] kobject: 'tx-0' (0000000098aca43f): kobject_uevent_env
[ 1067.453217] kobject: 'tx-0' (0000000098aca43f): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0'
[ 1067.464725] kobject: 'tunl0' (000000006046fc52): kobject_add_internal: parent: 'net', set: 'devices'
[ 1067.475374] kobject: 'tunl0' (000000006046fc52): kobject_uevent_env
[ 1067.482038] kobject: 'tunl0' (000000006046fc52): fill_kobj_path: path = '/devices/virtual/net/tunl0'
[ 1067.493493] kobject: 'holders' (0000000074d225e6): kobject_cleanup, parent 00000000b284420c
[ 1067.496005] kobject: 'loop3' (0000000063865547): fill_kobj_path: path = '/devices/virtual/block/loop3'
[ 1067.506527] kobject: 'holders' (0000000074d225e6): auto cleanup kobject_del
[ 1067.514762] kobject: 'loop1' (00000000243dd996): kobject_uevent_env
[ 1067.528859] kobject: 'queues' (00000000355a821e): kobject_add_internal: parent: 'tunl0', set: '<NULL>'
[ 1067.539708] kobject: 'loop1' (00000000243dd996): fill_kobj_path: path = '/devices/virtual/block/loop1'
[ 1067.553548] kobject: 'loop2' (00000000a30be3ec): kobject_uevent_env
[ 1067.561759] kobject: 'queues' (00000000355a821e): kobject_uevent_env
[ 1067.570983] kobject: 'loop2' (00000000a30be3ec): fill_kobj_path: path = '/devices/virtual/block/loop2'
[ 1067.579606] kobject: 'holders' (0000000074d225e6): calling ktype release
03:47:10 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$rxrpc(0x21, 0x2, 0xa)
setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f0000000100)='/dev/kvm\x02', 0x9)

[ 1067.580619] kobject: 'queues' (00000000355a821e): kobject_uevent_env: filter function caused the event to drop!
[ 1067.611706] kobject: 'rx-0' (0000000022e134f1): kobject_add_internal: parent: 'queues', set: 'queues'
[ 1067.623477] kobject: 'rx-0' (0000000022e134f1): kobject_uevent_env
[ 1067.631644] kobject: 'rx-0' (0000000022e134f1): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/rx-0'
[ 1067.645063] kobject: 'tx-0' (00000000e3967eca): kobject_add_internal: parent: 'queues', set: 'queues'
[ 1067.656447] kobject: 'tx-0' (00000000e3967eca): kobject_uevent_env
[ 1067.662864] kobject: 'tx-0' (00000000e3967eca): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/tx-0'
[ 1067.673267] kobject: (0000000074d225e6): dynamic_kobj_release
[ 1067.673279] kobject: 'holders': free name
[ 1067.679445] kobject: 'loop1' (00000000243dd996): kobject_uevent_env
03:47:10 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0xfeffffff00000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1067.702542] kobject: 'loop1' (00000000243dd996): fill_kobj_path: path = '/devices/virtual/block/loop1'
[ 1067.711665] kobject: 'loop5p1' (00000000b284420c): kobject_uevent_env
[ 1067.726312] kobject: 'loop5p1' (00000000b284420c): fill_kobj_path: path = '/devices/virtual/block/loop5/loop5p1'
[ 1067.733028] kobject: 'loop2' (00000000a30be3ec): kobject_uevent_env
[ 1067.736744] net_ratelimit: 10 callbacks suppressed
03:47:10 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$rxrpc(0x21, 0x2, 0xa)
setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f0000000100)='/dev/kvm\x05', 0x9)

[ 1067.736752] protocol 88fb is buggy, dev hsr_slave_0
[ 1067.736786] protocol 88fb is buggy, dev hsr_slave_1
[ 1067.742891]  loop5: p1 < > p4
[ 1067.763165] kobject: 'loop2' (00000000a30be3ec): fill_kobj_path: path = '/devices/virtual/block/loop2'
[ 1067.773314] kobject: 'loop5' (00000000b52baa4c): kobject_uevent_env
[ 1067.785761] kobject: 'loop5' (00000000b52baa4c): fill_kobj_path: path = '/devices/virtual/block/loop5'
[ 1067.801365] kobject: 'gre0' (00000000332685f6): kobject_add_internal: parent: 'net', set: 'devices'
[ 1067.811212] kobject: 'loop5p1' (00000000b284420c): kobject_cleanup, parent           (null)
[ 1067.811347] kobject: 'loop2' (00000000a30be3ec): kobject_uevent_env
[ 1067.824160] kobject: 'loop5p1' (00000000b284420c): calling ktype release
[ 1067.829964] kobject: 'loop5p1' (000000002f458039): kobject_add_internal: parent: 'loop5', set: 'devices'
[ 1067.836252] kobject: 'loop5p1': free name
[ 1067.855105] kobject: 'loop2' (00000000a30be3ec): fill_kobj_path: path = '/devices/virtual/block/loop2'
[ 1067.868082] kobject: 'gre0' (00000000332685f6): kobject_uevent_env
[ 1067.868353] kobject: 'loop5p1' (000000002f458039): kobject_uevent_env
[ 1067.896800] kobject: 'loop2' (00000000a30be3ec): kobject_uevent_env
[ 1067.903264] kobject: 'loop2' (00000000a30be3ec): fill_kobj_path: path = '/devices/virtual/block/loop2'
[ 1067.917311] kobject: 'loop5p1' (000000002f458039): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1067.925214] kobject: 'gre0' (00000000332685f6): fill_kobj_path: path = '/devices/virtual/net/gre0'
[ 1067.934048] kobject: 'holders' (00000000acdc2933): kobject_add_internal: parent: 'loop5p1', set: '<NULL>'
[ 1067.941666] kobject: 'queues' (000000000593458a): kobject_add_internal: parent: 'gre0', set: '<NULL>'
[ 1067.950496] kobject: 'loop1' (00000000243dd996): kobject_uevent_env
[ 1067.959022] kobject: 'queues' (000000000593458a): kobject_uevent_env
[ 1067.966975] kobject: 'loop1' (00000000243dd996): fill_kobj_path: path = '/devices/virtual/block/loop1'
[ 1067.969815] kobject: 'queues' (000000000593458a): kobject_uevent_env: filter function caused the event to drop!
[ 1067.978750] protocol 88fb is buggy, dev hsr_slave_0
[ 1067.978783] protocol 88fb is buggy, dev hsr_slave_1
[ 1067.978823] kobject: 'loop5p1' (000000002f458039): kobject_uevent_env
[ 1067.978849] protocol 88fb is buggy, dev hsr_slave_0
[ 1067.978858] kobject: 'loop5p1' (000000002f458039): fill_kobj_path: path = '/devices/virtual/block/loop5/loop5p1'
[ 1067.978880] protocol 88fb is buggy, dev hsr_slave_1
[ 1067.978983] loop5: p4 start 1854537728 is beyond EOD, truncated
[ 1067.992022] kobject: 'rx-0' (000000001197cd2f): kobject_add_internal: parent: 'queues', set: 'queues'
[ 1068.065003] kobject: 'rx-0' (000000001197cd2f): kobject_uevent_env
[ 1068.071554] kobject: 'rx-0' (000000001197cd2f): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/rx-0'
[ 1068.082134] kobject: 'tx-0' (000000001605d2bd): kobject_add_internal: parent: 'queues', set: 'queues'
[ 1068.091856] kobject: 'loop5' (00000000b52baa4c): kobject_uevent_env
[ 1068.093663] kobject: 'tx-0' (000000001605d2bd): kobject_uevent_env
[ 1068.098581] kobject: 'loop5' (00000000b52baa4c): fill_kobj_path: path = '/devices/virtual/block/loop5'
[ 1068.107194] kobject: 'tx-0' (000000001605d2bd): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/tx-0'
[ 1068.115165] __loop_clr_fd: partition scan of loop5 failed (rc=-22)
[ 1068.164862] kobject: 'gretap0' (0000000019d467a9): kobject_add_internal: parent: 'net', set: 'devices'
[ 1068.177510] print_req_error: I/O error, dev loop5, sector 0 flags 80700
[ 1068.185743] kobject: 'gretap0' (0000000019d467a9): kobject_uevent_env
[ 1068.187676] print_req_error: I/O error, dev loop5, sector 0 flags 0
[ 1068.192395] kobject: 'gretap0' (0000000019d467a9): fill_kobj_path: path = '/devices/virtual/net/gretap0'
[ 1068.192475] kobject: 'queues' (00000000bfab2299): kobject_add_internal: parent: 'gretap0', set: '<NULL>'
[ 1068.199383] Buffer I/O error on dev loop5p1, logical block 0, async page read
[ 1068.225265] kobject: 'queues' (00000000bfab2299): kobject_uevent_env
[ 1068.232318] print_req_error: I/O error, dev loop5, sector 0 flags 0
[ 1068.238764] Buffer I/O error on dev loop5p1, logical block 0, async page read
[ 1068.244420] kobject: 'queues' (00000000bfab2299): kobject_uevent_env: filter function caused the event to drop!
[ 1068.256638] Buffer I/O error on dev loop5p1, logical block 0, async page read
[ 1068.266578] Buffer I/O error on dev loop5p1, logical block 0, async page read
[ 1068.286931] kobject: 'rx-0' (00000000c779e6cf): kobject_add_internal: parent: 'queues', set: 'queues'
[ 1068.303837] kobject: 'rx-0' (00000000c779e6cf): kobject_uevent_env
[ 1068.312935] kobject: 'rx-0' (00000000c779e6cf): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/rx-0'
[ 1068.323804] kobject: 'tx-0' (00000000c5ca60ca): kobject_add_internal: parent: 'queues', set: 'queues'
[ 1068.336208] kobject: 'tx-0' (00000000c5ca60ca): kobject_uevent_env
[ 1068.343036] kobject: 'tx-0' (00000000c5ca60ca): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/tx-0'
[ 1068.356843] kobject: 'batman_adv' (000000008362912b): kobject_add_internal: parent: 'gretap0', set: '<NULL>'
[ 1068.367356] kobject: 'loop3' (0000000063865547): kobject_uevent_env
[ 1068.369590] kobject: 'erspan0' (00000000d2f404ea): kobject_add_internal: parent: 'net', set: 'devices'
[ 1068.384959] kobject: 'loop3' (0000000063865547): fill_kobj_path: path = '/devices/virtual/block/loop3'
[ 1068.385918] kobject: 'erspan0' (00000000d2f404ea): kobject_uevent_env
[ 1068.404587] kobject: 'erspan0' (00000000d2f404ea): fill_kobj_path: path = '/devices/virtual/net/erspan0'
[ 1068.437309] kobject: 'queues' (00000000d97b857a): kobject_add_internal: parent: 'erspan0', set: '<NULL>'
[ 1068.447399] kobject: 'queues' (00000000d97b857a): kobject_uevent_env
[ 1068.459356] kobject: 'queues' (00000000d97b857a): kobject_uevent_env: filter function caused the event to drop!
[ 1068.469967] kobject: 'rx-0' (000000001dbb3b18): kobject_add_internal: parent: 'queues', set: 'queues'
[ 1068.482537] kobject: 'rx-0' (000000001dbb3b18): kobject_uevent_env
[ 1068.489227] kobject: 'rx-0' (000000001dbb3b18): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/rx-0'
[ 1068.502716] kobject: 'tx-0' (000000008d7e3fab): kobject_add_internal: parent: 'queues', set: 'queues'
[ 1068.512256] kobject: 'tx-0' (000000008d7e3fab): kobject_uevent_env
[ 1068.518628] kobject: 'tx-0' (000000008d7e3fab): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/tx-0'
[ 1068.529611] kobject: 'batman_adv' (0000000084d7cd78): kobject_add_internal: parent: 'erspan0', set: '<NULL>'
[ 1068.542754] kobject: 'ip_vti0' (00000000c9dd5292): kobject_add_internal: parent: 'net', set: 'devices'
[ 1068.555933] kobject: 'ip_vti0' (00000000c9dd5292): kobject_uevent_env
[ 1068.562749] kobject: 'ip_vti0' (00000000c9dd5292): fill_kobj_path: path = '/devices/virtual/net/ip_vti0'
[ 1068.573521] kobject: 'queues' (000000002cba5430): kobject_add_internal: parent: 'ip_vti0', set: '<NULL>'
[ 1068.585647] kobject: 'queues' (000000002cba5430): kobject_uevent_env
[ 1068.592214] kobject: 'queues' (000000002cba5430): kobject_uevent_env: filter function caused the event to drop!
[ 1068.603005] kobject: 'rx-0' (00000000a750758f): kobject_add_internal: parent: 'queues', set: 'queues'
[ 1068.614946] kobject: 'rx-0' (00000000a750758f): kobject_uevent_env
[ 1068.621377] kobject: 'rx-0' (00000000a750758f): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/rx-0'
[ 1068.633165] kobject: 'tx-0' (00000000fc742aaa): kobject_add_internal: parent: 'queues', set: 'queues'
[ 1068.645136] kobject: 'tx-0' (00000000fc742aaa): kobject_uevent_env
[ 1068.651553] kobject: 'tx-0' (00000000fc742aaa): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/tx-0'
[ 1068.665176] kobject: 'ip6_vti0' (0000000066777d82): kobject_add_internal: parent: 'net', set: 'devices'
[ 1068.676797] kobject: 'ip6_vti0' (0000000066777d82): kobject_uevent_env
[ 1068.683674] kobject: 'ip6_vti0' (0000000066777d82): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0'
[ 1068.696392] kobject: 'queues' (0000000028e9c764): kobject_add_internal: parent: 'ip6_vti0', set: '<NULL>'
[ 1068.706362] kobject: 'queues' (0000000028e9c764): kobject_uevent_env
[ 1068.713020] kobject: 'queues' (0000000028e9c764): kobject_uevent_env: filter function caused the event to drop!
[ 1068.726125] kobject: 'rx-0' (00000000838561bd): kobject_add_internal: parent: 'queues', set: 'queues'
[ 1068.736515] kobject: 'rx-0' (00000000838561bd): kobject_uevent_env
[ 1068.743110] kobject: 'rx-0' (00000000838561bd): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0/queues/rx-0'
[ 1068.756287] kobject: 'tx-0' (00000000dbdb033f): kobject_add_internal: parent: 'queues', set: 'queues'
[ 1068.766346] kobject: 'tx-0' (00000000dbdb033f): kobject_uevent_env
[ 1068.772938] kobject: 'tx-0' (00000000dbdb033f): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0/queues/tx-0'
[ 1068.787526] kobject: 'sit0' (00000000595c109e): kobject_add_internal: parent: 'net', set: 'devices'
[ 1068.797815] kobject: 'sit0' (00000000595c109e): kobject_uevent_env
[ 1068.806799] kobject: 'sit0' (00000000595c109e): fill_kobj_path: path = '/devices/virtual/net/sit0'
[ 1068.816219] kobject: 'queues' (0000000025e932a3): kobject_add_internal: parent: 'sit0', set: '<NULL>'
[ 1068.828409] kobject: 'queues' (0000000025e932a3): kobject_uevent_env
[ 1068.835128] kobject: 'queues' (0000000025e932a3): kobject_uevent_env: filter function caused the event to drop!
[ 1068.848144] kobject: 'rx-0' (000000005a6c8c98): kobject_add_internal: parent: 'queues', set: 'queues'
[ 1068.857670] kobject: 'rx-0' (000000005a6c8c98): kobject_uevent_env
[ 1068.864169] kobject: 'rx-0' (000000005a6c8c98): fill_kobj_path: path = '/devices/virtual/net/sit0/queues/rx-0'
[ 1068.874464] kobject: 'tx-0' (000000008d152d30): kobject_add_internal: parent: 'queues', set: 'queues'
[ 1068.884087] kobject: 'tx-0' (000000008d152d30): kobject_uevent_env
[ 1068.890511] kobject: 'tx-0' (000000008d152d30): fill_kobj_path: path = '/devices/virtual/net/sit0/queues/tx-0'
[ 1068.901495] kobject: 'ip6tnl0' (00000000dfcd519a): kobject_add_internal: parent: 'net', set: 'devices'
[ 1068.911458] kobject: 'ip6tnl0' (00000000dfcd519a): kobject_uevent_env
[ 1068.918150] kobject: 'ip6tnl0' (00000000dfcd519a): fill_kobj_path: path = '/devices/virtual/net/ip6tnl0'
[ 1068.927915] kobject: 'queues' (00000000f66fc7fe): kobject_add_internal: parent: 'ip6tnl0', set: '<NULL>'
[ 1068.937722] kobject: 'queues' (00000000f66fc7fe): kobject_uevent_env
[ 1068.944321] kobject: 'queues' (00000000f66fc7fe): kobject_uevent_env: filter function caused the event to drop!
[ 1068.954702] kobject: 'rx-0' (00000000d711ad18): kobject_add_internal: parent: 'queues', set: 'queues'
[ 1068.964237] kobject: 'rx-0' (00000000d711ad18): kobject_uevent_env
[ 1068.970640] kobject: 'rx-0' (00000000d711ad18): fill_kobj_path: path = '/devices/virtual/net/ip6tnl0/queues/rx-0'
[ 1068.981189] kobject: 'tx-0' (00000000fcdb9728): kobject_add_internal: parent: 'queues', set: 'queues'
[ 1068.990774] kobject: 'tx-0' (00000000fcdb9728): kobject_uevent_env
[ 1068.997199] kobject: 'tx-0' (00000000fcdb9728): fill_kobj_path: path = '/devices/virtual/net/ip6tnl0/queues/tx-0'
[ 1069.008441] kobject: 'ip6gre0' (000000009ef06026): kobject_add_internal: parent: 'net', set: 'devices'
[ 1069.018645] kobject: 'ip6gre0' (000000009ef06026): kobject_uevent_env
[ 1069.025387] kobject: 'ip6gre0' (000000009ef06026): fill_kobj_path: path = '/devices/virtual/net/ip6gre0'
[ 1069.035162] kobject: 'queues' (00000000cdc067a4): kobject_add_internal: parent: 'ip6gre0', set: '<NULL>'
[ 1069.044908] kobject: 'queues' (00000000cdc067a4): kobject_uevent_env
[ 1069.051484] kobject: 'queues' (00000000cdc067a4): kobject_uevent_env: filter function caused the event to drop!
[ 1069.061823] kobject: 'rx-0' (0000000034f3384e): kobject_add_internal: parent: 'queues', set: 'queues'
[ 1069.071296] kobject: 'rx-0' (0000000034f3384e): kobject_uevent_env
[ 1069.077779] kobject: 'rx-0' (0000000034f3384e): fill_kobj_path: path = '/devices/virtual/net/ip6gre0/queues/rx-0'
[ 1069.088349] kobject: 'tx-0' (00000000e9c53faf): kobject_add_internal: parent: 'queues', set: 'queues'
[ 1069.097894] kobject: 'tx-0' (00000000e9c53faf): kobject_uevent_env
[ 1069.104355] kobject: 'tx-0' (00000000e9c53faf): fill_kobj_path: path = '/devices/virtual/net/ip6gre0/queues/tx-0'
[ 1069.284906] kobject: 'rx-0' (0000000034f3384e): kobject_cleanup, parent 00000000cdc067a4
[ 1069.293182] kobject: 'rx-0' (0000000034f3384e): auto cleanup 'remove' event
[ 1069.300332] kobject: 'rx-0' (0000000034f3384e): kobject_uevent_env
[ 1069.306702] kobject: 'rx-0' (0000000034f3384e): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1069.317061] kobject: 'rx-0' (0000000034f3384e): auto cleanup kobject_del
[ 1069.323918] kobject: 'rx-0' (0000000034f3384e): calling ktype release
[ 1069.330561] kobject: 'rx-0': free name
[ 1069.334673] kobject: 'tx-0' (00000000e9c53faf): kobject_cleanup, parent 00000000cdc067a4
[ 1069.342913] kobject: 'tx-0' (00000000e9c53faf): auto cleanup 'remove' event
[ 1069.350071] kobject: 'tx-0' (00000000e9c53faf): kobject_uevent_env
[ 1069.356423] kobject: 'tx-0' (00000000e9c53faf): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1069.366508] kobject: 'tx-0' (00000000e9c53faf): auto cleanup kobject_del
[ 1069.373381] kobject: 'tx-0' (00000000e9c53faf): calling ktype release
[ 1069.380002] kobject: 'tx-0': free name
[ 1069.383901] kobject: 'queues' (00000000cdc067a4): kobject_cleanup, parent           (null)
[ 1069.392348] kobject: 'queues' (00000000cdc067a4): calling ktype release
[ 1069.399129] kobject: 'queues' (00000000cdc067a4): kset_release
[ 1069.405143] kobject: 'queues': free name
[ 1069.409399] kobject: 'ip6gre0' (000000009ef06026): kobject_uevent_env
[ 1069.424033] kobject: 'ip6gre0' (000000009ef06026): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1069.435030] kobject: 'rx-0' (000000004d72e0b6): kobject_cleanup, parent 0000000047d349a5
[ 1069.443270] kobject: 'rx-0' (000000004d72e0b6): auto cleanup 'remove' event
[ 1069.450668] kobject: 'rx-0' (000000004d72e0b6): kobject_uevent_env
[ 1069.457039] kobject: 'rx-0' (000000004d72e0b6): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1069.467123] kobject: 'rx-0' (000000004d72e0b6): auto cleanup kobject_del
[ 1069.474020] kobject: 'rx-0' (000000004d72e0b6): calling ktype release
[ 1069.480599] kobject: 'rx-0': free name
[ 1069.484546] kobject: 'tx-0' (00000000a1fdc71b): kobject_cleanup, parent 0000000047d349a5
[ 1069.492776] kobject: 'tx-0' (00000000a1fdc71b): auto cleanup 'remove' event
[ 1069.500695] kobject: 'tx-0' (00000000a1fdc71b): kobject_uevent_env
[ 1069.507200] kobject: 'tx-0' (00000000a1fdc71b): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1069.517485] kobject: 'tx-0' (00000000a1fdc71b): auto cleanup kobject_del
[ 1069.524771] kobject: 'tx-0' (00000000a1fdc71b): calling ktype release
[ 1069.531430] kobject: 'tx-0': free name
[ 1069.535413] kobject: 'queues' (0000000047d349a5): kobject_cleanup, parent           (null)
[ 1069.543860] kobject: 'queues' (0000000047d349a5): calling ktype release
[ 1069.550735] kobject: 'queues' (0000000047d349a5): kset_release
[ 1069.556799] kobject: 'queues': free name
[ 1069.561194] kobject: 'ip6gre0' (00000000e87ca4f3): kobject_uevent_env
[ 1069.567890] kobject: 'ip6gre0' (00000000e87ca4f3): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1069.579068] kobject: 'rx-0' (00000000d1c17751): kobject_cleanup, parent 0000000099de11d2
[ 1069.587417] kobject: 'rx-0' (00000000d1c17751): auto cleanup 'remove' event
[ 1069.594623] kobject: 'rx-0' (00000000d1c17751): kobject_uevent_env
[ 1069.600994] kobject: 'rx-0' (00000000d1c17751): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1069.611160] kobject: 'rx-0' (00000000d1c17751): auto cleanup kobject_del
[ 1069.618106] kobject: 'rx-0' (00000000d1c17751): calling ktype release
[ 1069.624793] kobject: 'rx-0': free name
[ 1069.628796] kobject: 'tx-0' (00000000505813aa): kobject_cleanup, parent 0000000099de11d2
[ 1069.637126] kobject: 'tx-0' (00000000505813aa): auto cleanup 'remove' event
[ 1069.644327] kobject: 'tx-0' (00000000505813aa): kobject_uevent_env
[ 1069.650722] kobject: 'tx-0' (00000000505813aa): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1069.660870] kobject: 'tx-0' (00000000505813aa): auto cleanup kobject_del
[ 1069.667822] kobject: 'tx-0' (00000000505813aa): calling ktype release
[ 1069.674508] kobject: 'tx-0': free name
[ 1069.678461] kobject: 'queues' (0000000099de11d2): kobject_cleanup, parent           (null)
[ 1069.686969] kobject: 'queues' (0000000099de11d2): calling ktype release
[ 1069.693798] kobject: 'queues' (0000000099de11d2): kset_release
[ 1069.699880] kobject: 'queues': free name
[ 1069.704355] kobject: 'ip6gre0' (0000000071751cd6): kobject_uevent_env
[ 1069.711038] kobject: 'ip6gre0' (0000000071751cd6): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1069.722046] kobject: 'rx-0' (00000000cf4dcc9f): kobject_cleanup, parent 00000000691d0245
[ 1069.730388] kobject: 'rx-0' (00000000cf4dcc9f): auto cleanup 'remove' event
[ 1069.737555] kobject: 'rx-0' (00000000cf4dcc9f): kobject_uevent_env
[ 1069.744015] kobject: 'rx-0' (00000000cf4dcc9f): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1069.754160] kobject: 'rx-0' (00000000cf4dcc9f): auto cleanup kobject_del
[ 1069.761064] kobject: 'rx-0' (00000000cf4dcc9f): calling ktype release
[ 1069.768062] kobject: 'rx-0': free name
[ 1069.771985] kobject: 'tx-0' (00000000a02b2615): kobject_cleanup, parent 00000000691d0245
[ 1069.780322] kobject: 'tx-0' (00000000a02b2615): auto cleanup 'remove' event
[ 1069.787509] kobject: 'tx-0' (00000000a02b2615): kobject_uevent_env
[ 1069.793873] kobject: 'tx-0' (00000000a02b2615): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1069.804065] kobject: 'tx-0' (00000000a02b2615): auto cleanup kobject_del
[ 1069.810999] kobject: 'tx-0' (00000000a02b2615): calling ktype release
[ 1069.817699] kobject: 'tx-0': free name
[ 1069.821676] kobject: 'queues' (00000000691d0245): kobject_cleanup, parent           (null)
[ 1069.830178] kobject: 'queues' (00000000691d0245): calling ktype release
[ 1069.837008] kobject: 'queues' (00000000691d0245): kset_release
[ 1069.843067] kobject: 'queues': free name
[ 1069.847373] kobject: 'ip6gre0' (000000004849e330): kobject_uevent_env
[ 1069.854070] kobject: 'ip6gre0' (000000004849e330): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1069.914245] kobject: 'ip6gre0' (000000009ef06026): kobject_cleanup, parent           (null)
[ 1069.922758] kobject: 'ip6gre0' (000000009ef06026): auto cleanup 'remove' event
[ 1069.930221] kobject: 'ip6gre0' (000000009ef06026): kobject_uevent_env
[ 1069.937199] kobject: 'ip6gre0' (000000009ef06026): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1069.947646] kobject: 'ip6gre0' (000000009ef06026): calling ktype release
[ 1069.954620] kobject: 'ip6gre0': free name
03:47:13 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$rxrpc(0x21, 0x2, 0xa)
setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f0000000100)='/dev/kvm\x0f', 0x9)

03:47:13 executing program 0:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x2000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0)
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x0, 0x2)

03:47:13 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0xffffffff00000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:47:13 executing program 5:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0xfdfdffff, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:47:13 executing program 4:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00\x00\x01:\x00', @ifru_flags})

03:47:13 executing program 3:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

[ 1069.958822] kobject: 'ip6gre0' (00000000e87ca4f3): kobject_cleanup, parent           (null)
[ 1069.967452] kobject: 'ip6gre0' (00000000e87ca4f3): auto cleanup 'remove' event
[ 1069.982917] kobject: 'ip6gre0' (00000000e87ca4f3): kobject_uevent_env
[ 1069.993109] kobject: 'ip6gre0' (00000000e87ca4f3): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1070.005137] kobject: 'ip6gre0' (00000000e87ca4f3): calling ktype release
[ 1070.021066] kobject: 'loop5' (00000000b52baa4c): kobject_uevent_env
[ 1070.024367] kobject: 'loop4' (00000000c75b5a47): kobject_uevent_env
[ 1070.029607] kobject: 'loop5' (00000000b52baa4c): fill_kobj_path: path = '/devices/virtual/block/loop5'
[ 1070.033934] kobject: 'loop4' (00000000c75b5a47): fill_kobj_path: path = '/devices/virtual/block/loop4'
[ 1070.039134] kobject: 'ip6gre0': free name
[ 1070.067105] kobject: 'loop2' (00000000a30be3ec): kobject_uevent_env
03:47:13 executing program 0:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x3000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0)
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x0, 0x2)

03:47:13 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$rxrpc(0x21, 0x2, 0xa)
setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f0000000100)='/dev/kvm\x00', 0x9)

[ 1070.105145] IPVS: ftp: loaded support on port[0] = 21
[ 1070.123013] kobject: 'ip6gre0' (0000000071751cd6): kobject_cleanup, parent           (null)
[ 1070.132391] kobject: 'loop5' (00000000b52baa4c): kobject_uevent_env
[ 1070.132489] kobject: 'loop2' (00000000a30be3ec): fill_kobj_path: path = '/devices/virtual/block/loop2'
03:47:13 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0xffffffffffff0700, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1070.140908] kobject: 'ip6gre0' (0000000071751cd6): auto cleanup 'remove' event
[ 1070.162860] kobject: 'lo' (00000000ad2ef11f): kobject_add_internal: parent: 'net', set: 'devices'
[ 1070.173292] kobject: 'loop5' (00000000b52baa4c): fill_kobj_path: path = '/devices/virtual/block/loop5'
[ 1070.185421] kobject: 'ip6gre0' (0000000071751cd6): kobject_uevent_env
[ 1070.192942] kobject: 'lo' (00000000ad2ef11f): kobject_uevent_env
[ 1070.220765] kobject: 'ip6gre0' (0000000071751cd6): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1070.233828] kobject: 'loop1' (00000000243dd996): kobject_uevent_env
[ 1070.235846] kobject: 'ip6gre0' (0000000071751cd6): calling ktype release
03:47:13 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$rxrpc(0x21, 0x2, 0xa)
setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f0000000100)='/dev/kvm\x00', 0x9)

[ 1070.265368] kobject: 'lo' (00000000ad2ef11f): fill_kobj_path: path = '/devices/virtual/net/lo'
[ 1070.269631] kobject: 'loop1' (00000000243dd996): fill_kobj_path: path = '/devices/virtual/block/loop1'
[ 1070.277843] kobject: 'loop5' (00000000b52baa4c): kobject_uevent_env
[ 1070.286408] kobject: 'loop5' (00000000b52baa4c): kobject_uevent_env
[ 1070.297117] kobject: 'loop5' (00000000b52baa4c): fill_kobj_path: path = '/devices/virtual/block/loop5'
[ 1070.301719] kobject: 'ip6gre0': free name
03:47:13 executing program 0:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x4000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0)
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x0, 0x2)

[ 1070.324454] kobject: 'queues' (00000000ce47fd24): kobject_add_internal: parent: 'lo', set: '<NULL>'
[ 1070.334129] kobject: 'loop5' (00000000b52baa4c): fill_kobj_path: path = '/devices/virtual/block/loop5'
[ 1070.371087] kobject: 'queues' (00000000ce47fd24): kobject_uevent_env
[ 1070.379704] kobject: 'queues' (00000000ce47fd24): kobject_uevent_env: filter function caused the event to drop!
[ 1070.402077] kobject: 'loop2' (00000000a30be3ec): kobject_uevent_env
[ 1070.410918] kobject: 'loop2' (00000000a30be3ec): fill_kobj_path: path = '/devices/virtual/block/loop2'
03:47:13 executing program 5:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0xfeffffff, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1070.419235] kobject: 'rx-0' (000000007215091a): kobject_add_internal: parent: 'queues', set: 'queues'
03:47:13 executing program 0:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x5000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0)
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x0, 0x2)

03:47:13 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$rxrpc(0x21, 0x2, 0xa)
setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f0000000100)='/dev/kvm\x00', 0x9)

[ 1070.461738] kobject: 'rx-0' (000000007215091a): kobject_uevent_env
[ 1070.466891] kobject: 'loop2' (00000000a30be3ec): kobject_uevent_env
[ 1070.489324] kobject: 'loop2' (00000000a30be3ec): fill_kobj_path: path = '/devices/virtual/block/loop2'
[ 1070.497564] kobject: 'rx-0' (000000007215091a): fill_kobj_path: path = '/devices/virtual/net/lo/queues/rx-0'
[ 1070.512622] kobject: 'tx-0' (00000000b65830d4): kobject_add_internal: parent: 'queues', set: 'queues'
[ 1070.522515] kobject: 'loop5' (00000000b52baa4c): kobject_uevent_env
[ 1070.525671] kobject: 'tx-0' (00000000b65830d4): kobject_uevent_env
[ 1070.531094] kobject: 'loop5' (00000000b52baa4c): fill_kobj_path: path = '/devices/virtual/block/loop5'
[ 1070.537264] kobject: 'tx-0' (00000000b65830d4): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0'
[ 1070.558422] kobject: 'loop1' (00000000243dd996): kobject_uevent_env
[ 1070.567900] kobject: 'loop1' (00000000243dd996): fill_kobj_path: path = '/devices/virtual/block/loop1'
[ 1070.593122] kobject: 'tunl0' (00000000b6c774d8): kobject_add_internal: parent: 'net', set: 'devices'
03:47:13 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0xffffffffffffffff, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:47:13 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$rxrpc(0x21, 0x2, 0xa)
setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f0000000100)='/dev/kvm\x00', 0x9)

[ 1070.609261] kobject: 'loop5' (00000000b52baa4c): kobject_uevent_env
[ 1070.618853] kobject: 'tunl0' (00000000b6c774d8): kobject_uevent_env
[ 1070.628296] kobject: 'loop5' (00000000b52baa4c): fill_kobj_path: path = '/devices/virtual/block/loop5'
[ 1070.638462] kobject: 'tunl0' (00000000b6c774d8): fill_kobj_path: path = '/devices/virtual/net/tunl0'
[ 1070.660335] kobject: 'loop2' (00000000a30be3ec): kobject_uevent_env
[ 1070.668034] kobject: 'queues' (00000000966559c7): kobject_add_internal: parent: 'tunl0', set: '<NULL>'
[ 1070.672192] kobject: 'loop2' (00000000a30be3ec): fill_kobj_path: path = '/devices/virtual/block/loop2'
[ 1070.681633] kobject: 'queues' (00000000966559c7): kobject_uevent_env
[ 1070.697488] kobject: 'queues' (00000000966559c7): kobject_uevent_env: filter function caused the event to drop!
[ 1070.705758] kobject: 'loop1' (00000000243dd996): kobject_uevent_env
[ 1070.721278] kobject: 'rx-0' (000000002feed10b): kobject_add_internal: parent: 'queues', set: 'queues'
[ 1070.721698] kobject: 'loop1' (00000000243dd996): fill_kobj_path: path = '/devices/virtual/block/loop1'
[ 1070.732996] kobject: 'rx-0' (000000002feed10b): kobject_uevent_env
[ 1070.740850] kobject: 'loop5' (00000000b52baa4c): kobject_uevent_env
[ 1070.753829] kobject: 'loop5' (00000000b52baa4c): fill_kobj_path: path = '/devices/virtual/block/loop5'
[ 1070.772794] kobject: 'rx-0' (000000002feed10b): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/rx-0'
[ 1070.784015] kobject: 'loop2' (00000000a30be3ec): kobject_uevent_env
[ 1070.784311] kobject: 'tx-0' (0000000041b9bd43): kobject_add_internal: parent: 'queues', set: 'queues'
[ 1070.790457] kobject: 'loop2' (00000000a30be3ec): fill_kobj_path: path = '/devices/virtual/block/loop2'
[ 1070.810458] kobject: 'tx-0' (0000000041b9bd43): kobject_uevent_env
[ 1070.811317] kobject: 'loop5' (00000000b52baa4c): kobject_uevent_env
[ 1070.818972] kobject: 'tx-0' (0000000041b9bd43): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/tx-0'
[ 1070.830482] kobject: 'loop5' (00000000b52baa4c): fill_kobj_path: path = '/devices/virtual/block/loop5'
[ 1070.838630] kobject: 'ip6gre0' (000000004849e330): kobject_cleanup, parent           (null)
[ 1070.854185] kobject: 'gre0' (00000000c9b706d6): kobject_add_internal: parent: 'net', set: 'devices'
[ 1070.863541] kobject: 'ip6gre0' (000000004849e330): auto cleanup 'remove' event
[ 1070.865190] kobject: 'gre0' (00000000c9b706d6): kobject_uevent_env
[ 1070.877327] kobject: 'ip6gre0' (000000004849e330): kobject_uevent_env
[ 1070.877336] kobject: 'ip6gre0' (000000004849e330): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1070.877405] kobject: 'ip6gre0' (000000004849e330): calling ktype release
[ 1070.877422] kobject: 'ip6gre0': free name
[ 1070.888084] IPVS: ftp: loaded support on port[0] = 21
[ 1070.894900] kobject: 'gre0' (00000000c9b706d6): fill_kobj_path: path = '/devices/virtual/net/gre0'
[ 1070.922586] kobject: 'queues' (000000008449bb5f): kobject_add_internal: parent: 'gre0', set: '<NULL>'
[ 1070.929527] kobject: 'holders' (00000000acdc2933): kobject_cleanup, parent 000000002f458039
[ 1070.948943] kobject: 'holders' (00000000acdc2933): auto cleanup kobject_del
[ 1070.949665] kobject: 'queues' (000000008449bb5f): kobject_uevent_env
[ 1070.964824] kobject: 'holders' (00000000acdc2933): calling ktype release
[ 1070.968099] kobject: 'queues' (000000008449bb5f): kobject_uevent_env: filter function caused the event to drop!
[ 1070.972041] kobject: 'loop3' (0000000063865547): kobject_uevent_env
[ 1070.985512] kobject: 'rx-0' (0000000009fb298a): kobject_add_internal: parent: 'queues', set: 'queues'
[ 1071.000617] kobject: (00000000acdc2933): dynamic_kobj_release
[ 1071.007198] kobject: 'loop3' (0000000063865547): fill_kobj_path: path = '/devices/virtual/block/loop3'
[ 1071.016508] kobject: 'rx-0' (0000000009fb298a): kobject_uevent_env
[ 1071.018012] kobject: 'holders': free name
[ 1071.030958] kobject: 'rx-0' (0000000009fb298a): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/rx-0'
[ 1071.031475] kobject: 'loop2' (00000000a30be3ec): kobject_uevent_env
[ 1071.054665] kobject: 'loop5p1' (000000002f458039): kobject_uevent_env
[ 1071.055322] kobject: 'tx-0' (00000000fb60f33c): kobject_add_internal: parent: 'queues', set: 'queues'
[ 1071.065244] kobject: 'loop5p1' (000000002f458039): fill_kobj_path: path = '/devices/virtual/block/loop5/loop5p1'
[ 1071.071042] kobject: 'loop2' (00000000a30be3ec): fill_kobj_path: path = '/devices/virtual/block/loop2'
[ 1071.088169]  loop5: p1 < > p4
[ 1071.093857] kobject: 'loop5' (00000000b52baa4c): kobject_uevent_env
[ 1071.102837] kobject: 'loop5' (00000000b52baa4c): fill_kobj_path: path = '/devices/virtual/block/loop5'
[ 1071.110412] kobject: 'tx-0' (00000000fb60f33c): kobject_uevent_env
[ 1071.126856] kobject: 'loop5p1' (00000000d3e50e12): kobject_add_internal: parent: 'loop5', set: 'devices'
[ 1071.129473] kobject: 'tx-0' (00000000fb60f33c): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/tx-0'
[ 1071.147013] kobject: 'loop5p1' (00000000d3e50e12): kobject_uevent_env
[ 1071.148103] kobject: 'gretap0' (00000000ba4ee055): kobject_add_internal: parent: 'net', set: 'devices'
[ 1071.164157] kobject: 'gretap0' (00000000ba4ee055): kobject_uevent_env
[ 1071.165568] kobject: 'loop5p1' (000000002f458039): kobject_cleanup, parent           (null)
[ 1071.171080] kobject: 'gretap0' (00000000ba4ee055): fill_kobj_path: path = '/devices/virtual/net/gretap0'
[ 1071.184651] kobject: 'loop5p1' (00000000d3e50e12): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1071.189601] kobject: 'queues' (00000000d638adf8): kobject_add_internal: parent: 'gretap0', set: '<NULL>'
[ 1071.209047] kobject: 'loop5p1' (000000002f458039): calling ktype release
[ 1071.218063] kobject: 'loop5p1': free name
[ 1071.221704] kobject: 'queues' (00000000d638adf8): kobject_uevent_env
[ 1071.222482] kobject: 'holders' (00000000696a07b3): kobject_add_internal: parent: 'loop5p1', set: '<NULL>'
[ 1071.238844] kobject: 'queues' (00000000d638adf8): kobject_uevent_env: filter function caused the event to drop!
[ 1071.240917] kobject: 'loop5p1' (00000000d3e50e12): kobject_uevent_env
[ 1071.258199] kobject: 'loop5p1' (00000000d3e50e12): fill_kobj_path: path = '/devices/virtual/block/loop5/loop5p1'
[ 1071.262460] kobject: 'rx-0' (00000000fac56e96): kobject_add_internal: parent: 'queues', set: 'queues'
[ 1071.269656] loop5: p4 start 1854537728 is beyond EOD, truncated
[ 1071.282184] kobject: 'rx-0' (00000000fac56e96): kobject_uevent_env
[ 1071.290923] kobject: 'rx-0' (00000000fac56e96): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/rx-0'
[ 1071.307027] kobject: 'tx-0' (000000001c3a34dd): kobject_add_internal: parent: 'queues', set: 'queues'
[ 1071.316707] kobject: 'tx-0' (000000001c3a34dd): kobject_uevent_env
[ 1071.323110] kobject: 'tx-0' (000000001c3a34dd): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/tx-0'
[ 1071.334259] kobject: 'batman_adv' (000000000bb456dd): kobject_add_internal: parent: 'gretap0', set: '<NULL>'
[ 1071.345937] kobject: 'rx-0' (00000000d711ad18): kobject_cleanup, parent 00000000f66fc7fe
[ 1071.348163] kobject: 'loop5' (00000000b52baa4c): kobject_uevent_env
[ 1071.354650] kobject: 'rx-0' (00000000d711ad18): auto cleanup 'remove' event
[ 1071.362930] kobject: 'loop5' (00000000b52baa4c): fill_kobj_path: path = '/devices/virtual/block/loop5'
[ 1071.368146] kobject: 'rx-0' (00000000d711ad18): kobject_uevent_env
[ 1071.381611] __loop_clr_fd: partition scan of loop5 failed (rc=-22)
[ 1071.388461] kobject: 'rx-0' (00000000d711ad18): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1071.397062] print_req_error: 8 callbacks suppressed
[ 1071.397072] print_req_error: I/O error, dev loop5, sector 0 flags 80700
[ 1071.400941] kobject: 'rx-0' (00000000d711ad18): auto cleanup kobject_del
[ 1071.413681] print_req_error: I/O error, dev loop5, sector 0 flags 0
[ 1071.419950] kobject: 'loop5' (00000000b52baa4c): kobject_uevent_env
[ 1071.427722] buffer_io_error: 6 callbacks suppressed
[ 1071.427730] Buffer I/O error on dev loop5p1, logical block 0, async page read
[ 1071.433007] kobject: 'loop5' (00000000b52baa4c): fill_kobj_path: path = '/devices/virtual/block/loop5'
[ 1071.440206] print_req_error: I/O error, dev loop5, sector 0 flags 0
[ 1071.445415] kobject: 'rx-0' (00000000d711ad18): calling ktype release
[ 1071.454610] Buffer I/O error on dev loop5p1, logical block 0, async page read
[ 1071.461639] kobject: 'loop5' (00000000b52baa4c): kobject_uevent_env
[ 1071.470523] print_req_error: I/O error, dev loop5, sector 0 flags 0
[ 1071.475119] kobject: 'rx-0': free name
[ 1071.481299] Buffer I/O error on dev loop5p1, logical block 0, async page read
[ 1071.481528] print_req_error: I/O error, dev loop5, sector 0 flags 0
[ 1071.493258] kobject: 'loop5' (00000000b52baa4c): fill_kobj_path: path = '/devices/virtual/block/loop5'
[ 1071.499739] Buffer I/O error on dev loop5p1, logical block 0, async page read
[ 1071.508004] kobject: 'tx-0' (00000000fcdb9728): kobject_cleanup, parent 00000000f66fc7fe
[ 1071.518262] kobject: 'loop5' (00000000b52baa4c): kobject_uevent_env
[ 1071.536328] kobject: 'tx-0' (00000000fcdb9728): auto cleanup 'remove' event
[ 1071.537716] kobject: 'loop5' (00000000b52baa4c): fill_kobj_path: path = '/devices/virtual/block/loop5'
[ 1071.554480] kobject: 'tx-0' (00000000fcdb9728): kobject_uevent_env
[ 1071.554971] kobject: 'loop5' (00000000b52baa4c): kobject_uevent_env
[ 1071.571232] kobject: 'tx-0' (00000000fcdb9728): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1071.572608] kobject: 'loop5' (00000000b52baa4c): fill_kobj_path: path = '/devices/virtual/block/loop5'
[ 1071.586018] kobject: 'tx-0' (00000000fcdb9728): auto cleanup kobject_del
[ 1071.598034] kobject: 'loop5' (00000000b52baa4c): kobject_uevent_env
[ 1071.598079] kobject: 'tx-0' (00000000fcdb9728): calling ktype release
[ 1071.606621] kobject: 'loop5' (00000000b52baa4c): fill_kobj_path: path = '/devices/virtual/block/loop5'
[ 1071.611138] kobject: 'tx-0': free name
[ 1071.627727] kobject: 'queues' (00000000f66fc7fe): kobject_cleanup, parent           (null)
[ 1071.638347] kobject: 'queues' (00000000f66fc7fe): calling ktype release
[ 1071.645224] kobject: 'queues' (00000000f66fc7fe): kset_release
[ 1071.651356] kobject: 'queues': free name
[ 1071.656028] kobject: 'ip6tnl0' (00000000dfcd519a): kobject_uevent_env
[ 1071.662679] kobject: 'ip6tnl0' (00000000dfcd519a): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1071.675659] kobject: 'rx-0' (00000000b3f7c06e): kobject_cleanup, parent 000000007b9abffe
[ 1071.684113] kobject: 'rx-0' (00000000b3f7c06e): auto cleanup 'remove' event
[ 1071.691334] kobject: 'rx-0' (00000000b3f7c06e): kobject_uevent_env
[ 1071.698553] kobject: 'rx-0' (00000000b3f7c06e): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1071.708890] kobject: 'rx-0' (00000000b3f7c06e): auto cleanup kobject_del
[ 1071.715802] kobject: 'rx-0' (00000000b3f7c06e): calling ktype release
[ 1071.722388] kobject: 'rx-0': free name
[ 1071.726347] kobject: 'tx-0' (000000009b550f63): kobject_cleanup, parent 000000007b9abffe
[ 1071.734637] kobject: 'tx-0' (000000009b550f63): auto cleanup 'remove' event
[ 1071.741750] kobject: 'tx-0' (000000009b550f63): kobject_uevent_env
[ 1071.748110] kobject: 'tx-0' (000000009b550f63): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1071.758208] kobject: 'tx-0' (000000009b550f63): auto cleanup kobject_del
[ 1071.765096] kobject: 'tx-0' (000000009b550f63): calling ktype release
[ 1071.771674] kobject: 'tx-0': free name
[ 1071.775622] kobject: 'queues' (000000007b9abffe): kobject_cleanup, parent           (null)
[ 1071.784050] kobject: 'queues' (000000007b9abffe): calling ktype release
[ 1071.790803] kobject: 'queues' (000000007b9abffe): kset_release
[ 1071.796799] kobject: 'queues': free name
[ 1071.801107] kobject: 'ip6tnl0' (000000006e9812f2): kobject_uevent_env
[ 1071.807716] kobject: 'ip6tnl0' (000000006e9812f2): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1071.818594] kobject: 'rx-0' (0000000072f68b33): kobject_cleanup, parent 0000000066625824
[ 1071.827122] kobject: 'rx-0' (0000000072f68b33): auto cleanup 'remove' event
[ 1071.834281] kobject: 'rx-0' (0000000072f68b33): kobject_uevent_env
[ 1071.840614] kobject: 'rx-0' (0000000072f68b33): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1071.850697] kobject: 'rx-0' (0000000072f68b33): auto cleanup kobject_del
[ 1071.857584] kobject: 'rx-0' (0000000072f68b33): calling ktype release
[ 1071.864179] kobject: 'rx-0': free name
[ 1071.868104] kobject: 'tx-0' (000000006311c058): kobject_cleanup, parent 0000000066625824
[ 1071.876367] kobject: 'tx-0' (000000006311c058): auto cleanup 'remove' event
[ 1071.884022] kobject: 'tx-0' (000000006311c058): kobject_uevent_env
[ 1071.890335] kobject: 'tx-0' (000000006311c058): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1071.900536] kobject: 'tx-0' (000000006311c058): auto cleanup kobject_del
[ 1071.907446] kobject: 'tx-0' (000000006311c058): calling ktype release
[ 1071.914161] kobject: 'tx-0': free name
[ 1071.918071] kobject: 'queues' (0000000066625824): kobject_cleanup, parent           (null)
[ 1071.926492] kobject: 'queues' (0000000066625824): calling ktype release
[ 1071.933244] kobject: 'queues' (0000000066625824): kset_release
[ 1071.939247] kobject: 'queues': free name
[ 1071.943505] kobject: 'ip6tnl0' (000000004152076e): kobject_uevent_env
[ 1071.950121] kobject: 'ip6tnl0' (000000004152076e): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1071.961148] kobject: 'rx-0' (0000000088debf99): kobject_cleanup, parent 000000004cc1474d
[ 1071.969420] kobject: 'rx-0' (0000000088debf99): auto cleanup 'remove' event
[ 1071.976641] kobject: 'rx-0' (0000000088debf99): kobject_uevent_env
[ 1071.982963] kobject: 'rx-0' (0000000088debf99): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1071.993064] kobject: 'rx-0' (0000000088debf99): auto cleanup kobject_del
[ 1072.000035] kobject: 'rx-0' (0000000088debf99): calling ktype release
[ 1072.006654] kobject: 'rx-0': free name
[ 1072.010572] kobject: 'tx-0' (000000009400145d): kobject_cleanup, parent 000000004cc1474d
[ 1072.018828] kobject: 'tx-0' (000000009400145d): auto cleanup 'remove' event
[ 1072.025953] kobject: 'tx-0' (000000009400145d): kobject_uevent_env
[ 1072.032270] kobject: 'tx-0' (000000009400145d): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1072.042375] kobject: 'tx-0' (000000009400145d): auto cleanup kobject_del
[ 1072.049255] kobject: 'tx-0' (000000009400145d): calling ktype release
[ 1072.055876] kobject: 'tx-0': free name
[ 1072.059777] kobject: 'queues' (000000004cc1474d): kobject_cleanup, parent           (null)
[ 1072.068211] kobject: 'queues' (000000004cc1474d): calling ktype release
[ 1072.075017] kobject: 'queues' (000000004cc1474d): kset_release
[ 1072.080994] kobject: 'queues': free name
[ 1072.085547] kobject: 'ip6tnl0' (00000000a6b839a4): kobject_uevent_env
[ 1072.092136] kobject: 'ip6tnl0' (00000000a6b839a4): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1072.144375] kobject: 'erspan0' (00000000394dcacf): kobject_add_internal: parent: 'net', set: 'devices'
[ 1072.156610] kobject: 'erspan0' (00000000394dcacf): kobject_uevent_env
[ 1072.163252] kobject: 'erspan0' (00000000394dcacf): fill_kobj_path: path = '/devices/virtual/net/erspan0'
[ 1072.173003] kobject: 'queues' (000000000253315a): kobject_add_internal: parent: 'erspan0', set: '<NULL>'
[ 1072.184917] kobject: 'queues' (000000000253315a): kobject_uevent_env
[ 1072.191430] kobject: 'queues' (000000000253315a): kobject_uevent_env: filter function caused the event to drop!
[ 1072.202753] kobject: 'rx-0' (0000000092ac42cd): kobject_add_internal: parent: 'queues', set: 'queues'
[ 1072.213276] kobject: 'rx-0' (0000000092ac42cd): kobject_uevent_env
[ 1072.221060] kobject: 'rx-0' (0000000092ac42cd): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/rx-0'
[ 1072.232650] kobject: 'tx-0' (0000000090e15ff7): kobject_add_internal: parent: 'queues', set: 'queues'
[ 1072.243241] kobject: 'tx-0' (0000000090e15ff7): kobject_uevent_env
[ 1072.250776] kobject: 'tx-0' (0000000090e15ff7): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/tx-0'
[ 1072.263046] kobject: 'batman_adv' (00000000d1dbbe04): kobject_add_internal: parent: 'erspan0', set: '<NULL>'
[ 1072.274388] kobject: 'ip6tnl0' (00000000dfcd519a): kobject_cleanup, parent           (null)
[ 1072.282925] kobject: 'ip6tnl0' (00000000dfcd519a): auto cleanup 'remove' event
[ 1072.292355] kobject: 'ip_vti0' (0000000056388cf5): kobject_add_internal: parent: 'net', set: 'devices'
[ 1072.302280] kobject: 'ip6tnl0' (00000000dfcd519a): kobject_uevent_env
[ 1072.310640] kobject: 'ip6tnl0' (00000000dfcd519a): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1072.322096] kobject: 'ip_vti0' (0000000056388cf5): kobject_uevent_env
[ 1072.330526] kobject: 'ip6tnl0' (00000000dfcd519a): calling ktype release
[ 1072.337863] kobject: 'ip_vti0' (0000000056388cf5): fill_kobj_path: path = '/devices/virtual/net/ip_vti0'
[ 1072.349643] kobject: 'ip6tnl0': free name
[ 1072.354388] kobject: 'queues' (00000000f90a63f6): kobject_add_internal: parent: 'ip_vti0', set: '<NULL>'
[ 1072.365978] kobject: 'queues' (00000000f90a63f6): kobject_uevent_env
[ 1072.372549] kobject: 'queues' (00000000f90a63f6): kobject_uevent_env: filter function caused the event to drop!
[ 1072.383229] kobject: 'rx-0' (000000006311dd6e): kobject_add_internal: parent: 'queues', set: 'queues'
[ 1072.394955] kobject: 'rx-0' (000000006311dd6e): kobject_uevent_env
[ 1072.401384] kobject: 'rx-0' (000000006311dd6e): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/rx-0'
[ 1072.412993] kobject: 'tx-0' (0000000080d4d6f9): kobject_add_internal: parent: 'queues', set: 'queues'
[ 1072.423193] kobject: 'tx-0' (0000000080d4d6f9): kobject_uevent_env
[ 1072.430292] kobject: 'tx-0' (0000000080d4d6f9): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/tx-0'
[ 1072.441829] kobject: 'ip6tnl0' (000000006e9812f2): kobject_cleanup, parent           (null)
[ 1072.441991] kobject: 'ip6_vti0' (00000000e7e67cf2): kobject_add_internal: parent: 'net', set: 'devices'
[ 1072.455351] kobject: 'ip6tnl0' (000000006e9812f2): auto cleanup 'remove' event
[ 1072.464807] kobject: 'ip6_vti0' (00000000e7e67cf2): kobject_uevent_env
[ 1072.474467] kobject: 'ip6_vti0' (00000000e7e67cf2): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0'
[ 1072.475204] kobject: 'ip6tnl0' (000000006e9812f2): kobject_uevent_env
[ 1072.484621] kobject: 'queues' (0000000065a217c6): kobject_add_internal: parent: 'ip6_vti0', set: '<NULL>'
[ 1072.500832] kobject: 'ip6tnl0' (000000006e9812f2): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1072.500873] kobject: 'queues' (0000000065a217c6): kobject_uevent_env
[ 1072.512231] kobject: 'ip6tnl0' (000000006e9812f2): calling ktype release
[ 1072.517913] kobject: 'queues' (0000000065a217c6): kobject_uevent_env: filter function caused the event to drop!
[ 1072.526683] kobject: 'ip6tnl0': free name
[ 1072.535357] kobject: 'rx-0' (00000000a72e5ec4): kobject_add_internal: parent: 'queues', set: 'queues'
[ 1072.548827] kobject: 'rx-0' (00000000a72e5ec4): kobject_uevent_env
[ 1072.555255] kobject: 'rx-0' (00000000a72e5ec4): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0/queues/rx-0'
[ 1072.565965] kobject: 'tx-0' (00000000d2c9a95b): kobject_add_internal: parent: 'queues', set: 'queues'
[ 1072.575528] kobject: 'tx-0' (00000000d2c9a95b): kobject_uevent_env
[ 1072.581984] kobject: 'tx-0' (00000000d2c9a95b): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0/queues/tx-0'
[ 1072.593314] kobject: 'sit0' (000000004d4b99c7): kobject_add_internal: parent: 'net', set: 'devices'
[ 1072.603037] kobject: 'sit0' (000000004d4b99c7): kobject_uevent_env
[ 1072.609492] kobject: 'sit0' (000000004d4b99c7): fill_kobj_path: path = '/devices/virtual/net/sit0'
[ 1072.618891] kobject: 'queues' (00000000d93e6638): kobject_add_internal: parent: 'sit0', set: '<NULL>'
[ 1072.628411] kobject: 'queues' (00000000d93e6638): kobject_uevent_env
[ 1072.635090] kobject: 'queues' (00000000d93e6638): kobject_uevent_env: filter function caused the event to drop!
[ 1072.645454] kobject: 'rx-0' (00000000cbfc1dc9): kobject_add_internal: parent: 'queues', set: 'queues'
[ 1072.655061] kobject: 'rx-0' (00000000cbfc1dc9): kobject_uevent_env
[ 1072.661474] kobject: 'rx-0' (00000000cbfc1dc9): fill_kobj_path: path = '/devices/virtual/net/sit0/queues/rx-0'
[ 1072.671784] kobject: 'tx-0' (00000000348c2ed0): kobject_add_internal: parent: 'queues', set: 'queues'
[ 1072.681394] kobject: 'tx-0' (00000000348c2ed0): kobject_uevent_env
[ 1072.687883] kobject: 'tx-0' (00000000348c2ed0): fill_kobj_path: path = '/devices/virtual/net/sit0/queues/tx-0'
[ 1072.698946] kobject: 'ip6tnl0' (000000006fef3720): kobject_add_internal: parent: 'net', set: 'devices'
[ 1072.705865] kobject: 'ip6tnl0' (000000004152076e): kobject_cleanup, parent           (null)
[ 1072.708999] kobject: 'ip6tnl0' (000000006fef3720): kobject_uevent_env
[ 1072.723588] kobject: 'ip6tnl0' (000000006fef3720): fill_kobj_path: path = '/devices/virtual/net/ip6tnl0'
[ 1072.723638] kobject: 'ip6tnl0' (000000004152076e): auto cleanup 'remove' event
[ 1072.733398] kobject: 'queues' (00000000dbb8ea1b): kobject_add_internal: parent: 'ip6tnl0', set: '<NULL>'
[ 1072.747595] kobject: 'ip6tnl0' (000000004152076e): kobject_uevent_env
[ 1072.750594] kobject: 'queues' (00000000dbb8ea1b): kobject_uevent_env
[ 1072.758948] kobject: 'ip6tnl0' (000000004152076e): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1072.763596] kobject: 'queues' (00000000dbb8ea1b): kobject_uevent_env: filter function caused the event to drop!
[ 1072.773887] kobject: 'ip6tnl0' (000000004152076e): calling ktype release
[ 1072.773917] kobject: 'ip6tnl0': free name
[ 1072.784332] kobject: 'rx-0' (000000009c433adf): kobject_add_internal: parent: 'queues', set: 'queues'
[ 1072.804792] kobject: 'rx-0' (000000009c433adf): kobject_uevent_env
[ 1072.811231] kobject: 'rx-0' (000000009c433adf): fill_kobj_path: path = '/devices/virtual/net/ip6tnl0/queues/rx-0'
[ 1072.821800] kobject: 'tx-0' (000000008eeb3210): kobject_add_internal: parent: 'queues', set: 'queues'
[ 1072.831339] kobject: 'tx-0' (000000008eeb3210): kobject_uevent_env
[ 1072.837815] kobject: 'tx-0' (000000008eeb3210): fill_kobj_path: path = '/devices/virtual/net/ip6tnl0/queues/tx-0'
[ 1072.849065] kobject: 'ip6gre0' (0000000091e3dae9): kobject_add_internal: parent: 'net', set: 'devices'
[ 1072.859133] kobject: 'ip6gre0' (0000000091e3dae9): kobject_uevent_env
[ 1072.865840] kobject: 'ip6gre0' (0000000091e3dae9): fill_kobj_path: path = '/devices/virtual/net/ip6gre0'
[ 1072.875595] kobject: 'queues' (0000000025b5adc9): kobject_add_internal: parent: 'ip6gre0', set: '<NULL>'
[ 1072.885475] kobject: 'queues' (0000000025b5adc9): kobject_uevent_env
[ 1072.892038] kobject: 'queues' (0000000025b5adc9): kobject_uevent_env: filter function caused the event to drop!
[ 1072.902373] kobject: 'rx-0' (0000000023ebddda): kobject_add_internal: parent: 'queues', set: 'queues'
[ 1072.911901] kobject: 'rx-0' (0000000023ebddda): kobject_uevent_env
[ 1072.918326] kobject: 'rx-0' (0000000023ebddda): fill_kobj_path: path = '/devices/virtual/net/ip6gre0/queues/rx-0'
[ 1072.928907] kobject: 'tx-0' (000000008bcc7a12): kobject_add_internal: parent: 'queues', set: 'queues'
[ 1072.938538] kobject: 'tx-0' (000000008bcc7a12): kobject_uevent_env
[ 1072.945117] kobject: 'tx-0' (000000008bcc7a12): fill_kobj_path: path = '/devices/virtual/net/ip6gre0/queues/tx-0'
[ 1072.956549] kobject: 'ip6tnl0' (00000000a6b839a4): kobject_cleanup, parent           (null)
[ 1072.965180] kobject: 'ip6tnl0' (00000000a6b839a4): auto cleanup 'remove' event
[ 1072.972546] kobject: 'ip6tnl0' (00000000a6b839a4): kobject_uevent_env
[ 1072.979187] kobject: 'ip6tnl0' (00000000a6b839a4): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1072.989575] kobject: 'ip6tnl0' (00000000a6b839a4): calling ktype release
[ 1072.996738] kobject: 'ip6tnl0': free name
[ 1073.001666] kobject: 'rx-0' (000000005a6c8c98): kobject_cleanup, parent 0000000025e932a3
[ 1073.009968] kobject: 'rx-0' (000000005a6c8c98): auto cleanup 'remove' event
[ 1073.017110] kobject: 'rx-0' (000000005a6c8c98): kobject_uevent_env
[ 1073.023441] kobject: 'rx-0' (000000005a6c8c98): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1073.033518] kobject: 'rx-0' (000000005a6c8c98): auto cleanup kobject_del
[ 1073.040398] kobject: 'rx-0' (000000005a6c8c98): calling ktype release
[ 1073.047522] kobject: 'rx-0': free name
[ 1073.051452] kobject: 'tx-0' (000000008d152d30): kobject_cleanup, parent 0000000025e932a3
[ 1073.059764] kobject: 'tx-0' (000000008d152d30): auto cleanup 'remove' event
[ 1073.066892] kobject: 'tx-0' (000000008d152d30): kobject_uevent_env
[ 1073.073199] kobject: 'tx-0' (000000008d152d30): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1073.083273] kobject: 'tx-0' (000000008d152d30): auto cleanup kobject_del
[ 1073.090156] kobject: 'tx-0' (000000008d152d30): calling ktype release
[ 1073.096784] kobject: 'tx-0': free name
[ 1073.100692] kobject: 'queues' (0000000025e932a3): kobject_cleanup, parent           (null)
[ 1073.109127] kobject: 'queues' (0000000025e932a3): calling ktype release
[ 1073.115927] kobject: 'queues' (0000000025e932a3): kset_release
[ 1073.121904] kobject: 'queues': free name
[ 1073.126494] kobject: 'sit0' (00000000595c109e): kobject_uevent_env
[ 1073.132811] kobject: 'sit0' (00000000595c109e): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1073.143483] kobject: 'rx-0' (000000005c822ddf): kobject_cleanup, parent 00000000cfad06cc
[ 1073.152074] kobject: 'rx-0' (000000005c822ddf): auto cleanup 'remove' event
[ 1073.159236] kobject: 'rx-0' (000000005c822ddf): kobject_uevent_env
[ 1073.165591] kobject: 'rx-0' (000000005c822ddf): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1073.175692] kobject: 'rx-0' (000000005c822ddf): auto cleanup kobject_del
[ 1073.182561] kobject: 'rx-0' (000000005c822ddf): calling ktype release
[ 1073.189193] kobject: 'rx-0': free name
[ 1073.193120] kobject: 'tx-0' (00000000f9be7739): kobject_cleanup, parent 00000000cfad06cc
[ 1073.201378] kobject: 'tx-0' (00000000f9be7739): auto cleanup 'remove' event
[ 1073.208503] kobject: 'tx-0' (00000000f9be7739): kobject_uevent_env
[ 1073.214851] kobject: 'tx-0' (00000000f9be7739): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1073.224931] kobject: 'tx-0' (00000000f9be7739): auto cleanup kobject_del
[ 1073.231778] kobject: 'tx-0' (00000000f9be7739): calling ktype release
[ 1073.238379] kobject: 'tx-0': free name
[ 1073.242278] kobject: 'queues' (00000000cfad06cc): kobject_cleanup, parent           (null)
[ 1073.250711] kobject: 'queues' (00000000cfad06cc): calling ktype release
[ 1073.257664] kobject: 'queues' (00000000cfad06cc): kset_release
[ 1073.263626] kobject: 'queues': free name
[ 1073.267997] kobject: 'sit0' (00000000b982a3d6): kobject_uevent_env
[ 1073.274356] kobject: 'sit0' (00000000b982a3d6): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1073.285180] kobject: 'rx-0' (000000003dd16b5d): kobject_cleanup, parent 000000004731be66
[ 1073.293422] kobject: 'rx-0' (000000003dd16b5d): auto cleanup 'remove' event
[ 1073.300552] kobject: 'rx-0' (000000003dd16b5d): kobject_uevent_env
[ 1073.306910] kobject: 'rx-0' (000000003dd16b5d): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1073.316984] kobject: 'rx-0' (000000003dd16b5d): auto cleanup kobject_del
[ 1073.323839] kobject: 'rx-0' (000000003dd16b5d): calling ktype release
[ 1073.330453] kobject: 'rx-0': free name
[ 1073.334405] kobject: 'tx-0' (0000000019ff1767): kobject_cleanup, parent 000000004731be66
[ 1073.342637] kobject: 'tx-0' (0000000019ff1767): auto cleanup 'remove' event
[ 1073.349764] kobject: 'tx-0' (0000000019ff1767): kobject_uevent_env
[ 1073.356108] kobject: 'tx-0' (0000000019ff1767): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1073.366182] kobject: 'tx-0' (0000000019ff1767): auto cleanup kobject_del
[ 1073.373040] kobject: 'tx-0' (0000000019ff1767): calling ktype release
[ 1073.379651] kobject: 'tx-0': free name
[ 1073.383548] kobject: 'queues' (000000004731be66): kobject_cleanup, parent           (null)
[ 1073.392240] kobject: 'queues' (000000004731be66): calling ktype release
[ 1073.399038] kobject: 'queues' (000000004731be66): kset_release
[ 1073.405185] kobject: 'queues': free name
[ 1073.409443] kobject: '' (00000000d38147d6): kobject_uevent_env
[ 1073.415659] kobject: '' (00000000d38147d6): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1073.426182] kobject: 'rx-0' (00000000b17cbb51): kobject_cleanup, parent 000000008e86f7cd
[ 1073.434443] kobject: 'rx-0' (00000000b17cbb51): auto cleanup 'remove' event
[ 1073.441541] kobject: 'rx-0' (00000000b17cbb51): kobject_uevent_env
[ 1073.447895] kobject: 'rx-0' (00000000b17cbb51): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1073.457969] kobject: 'rx-0' (00000000b17cbb51): auto cleanup kobject_del
[ 1073.464859] kobject: 'rx-0' (00000000b17cbb51): calling ktype release
[ 1073.471438] kobject: 'rx-0': free name
[ 1073.475391] kobject: 'tx-0' (00000000a017010d): kobject_cleanup, parent 000000008e86f7cd
[ 1073.483623] kobject: 'tx-0' (00000000a017010d): auto cleanup 'remove' event
[ 1073.490754] kobject: 'tx-0' (00000000a017010d): kobject_uevent_env
[ 1073.497790] kobject: 'tx-0' (00000000a017010d): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1073.507901] kobject: 'tx-0' (00000000a017010d): auto cleanup kobject_del
[ 1073.515111] kobject: 'tx-0' (00000000a017010d): calling ktype release
[ 1073.521697] kobject: 'tx-0': free name
[ 1073.525641] kobject: 'queues' (000000008e86f7cd): kobject_cleanup, parent           (null)
[ 1073.534213] kobject: 'queues' (000000008e86f7cd): calling ktype release
[ 1073.540966] kobject: 'queues' (000000008e86f7cd): kset_release
[ 1073.546968] kobject: 'queues': free name
[ 1073.551295] kobject: 'sit0' (0000000046818174): kobject_uevent_env
[ 1073.557650] kobject: 'sit0' (0000000046818174): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1073.568260] kobject: 'rx-0' (0000000062556e0d): kobject_cleanup, parent 00000000bef092ed
[ 1073.576741] kobject: 'rx-0' (0000000062556e0d): auto cleanup 'remove' event
[ 1073.583849] kobject: 'rx-0' (0000000062556e0d): kobject_uevent_env
[ 1073.590212] kobject: 'rx-0' (0000000062556e0d): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1073.600295] kobject: 'rx-0' (0000000062556e0d): auto cleanup kobject_del
[ 1073.607192] kobject: 'rx-0' (0000000062556e0d): calling ktype release
[ 1073.613768] kobject: 'rx-0': free name
[ 1073.617719] kobject: 'tx-0' (0000000003a9e886): kobject_cleanup, parent 00000000bef092ed
[ 1073.625972] kobject: 'tx-0' (0000000003a9e886): auto cleanup 'remove' event
[ 1073.633062] kobject: 'tx-0' (0000000003a9e886): kobject_uevent_env
[ 1073.639405] kobject: 'tx-0' (0000000003a9e886): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1073.649658] kobject: 'tx-0' (0000000003a9e886): auto cleanup kobject_del
[ 1073.656634] kobject: 'tx-0' (0000000003a9e886): calling ktype release
[ 1073.663391] kobject: 'tx-0': free name
[ 1073.667444] kobject: 'queues' (00000000bef092ed): kobject_cleanup, parent           (null)
[ 1073.675901] kobject: 'queues' (00000000bef092ed): calling ktype release
[ 1073.682671] kobject: 'queues' (00000000bef092ed): kset_release
[ 1073.688692] kobject: 'queues': free name
[ 1073.692997] kobject: 'sit0' (000000000798246a): kobject_uevent_env
[ 1073.699354] kobject: 'sit0' (000000000798246a): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1073.709982] kobject: 'rx-0' (000000009c04c052): kobject_cleanup, parent 00000000932205e6
[ 1073.718246] kobject: 'rx-0' (000000009c04c052): auto cleanup 'remove' event
[ 1073.725381] kobject: 'rx-0' (000000009c04c052): kobject_uevent_env
[ 1073.731697] kobject: 'rx-0' (000000009c04c052): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1073.741827] kobject: 'rx-0' (000000009c04c052): auto cleanup kobject_del
[ 1073.748723] kobject: 'rx-0' (000000009c04c052): calling ktype release
[ 1073.755354] kobject: 'rx-0': free name
[ 1073.759273] kobject: 'tx-0' (00000000ac338e06): kobject_cleanup, parent 00000000932205e6
[ 1073.767544] kobject: 'tx-0' (00000000ac338e06): auto cleanup 'remove' event
[ 1073.774855] kobject: 'tx-0' (00000000ac338e06): kobject_uevent_env
[ 1073.781166] kobject: 'tx-0' (00000000ac338e06): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1073.791260] kobject: 'tx-0' (00000000ac338e06): auto cleanup kobject_del
[ 1073.798251] kobject: 'tx-0' (00000000ac338e06): calling ktype release
[ 1073.804872] kobject: 'tx-0': free name
[ 1073.808774] kobject: 'queues' (00000000932205e6): kobject_cleanup, parent           (null)
[ 1073.817205] kobject: 'queues' (00000000932205e6): calling ktype release
[ 1073.824012] kobject: 'queues' (00000000932205e6): kset_release
[ 1073.830004] kobject: 'queues': free name
[ 1073.834371] kobject: '' (0000000069798d68): kobject_uevent_env
[ 1073.840440] kobject: '' (0000000069798d68): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1073.884137] kobject: 'sit0' (00000000595c109e): kobject_cleanup, parent           (null)
[ 1073.892410] kobject: 'sit0' (00000000595c109e): auto cleanup 'remove' event
[ 1073.899785] kobject: 'sit0' (00000000595c109e): kobject_uevent_env
[ 1073.906425] kobject: 'sit0' (00000000595c109e): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1073.916519] kobject: 'sit0' (00000000595c109e): calling ktype release
[ 1073.923124] kobject: 'sit0': free name
03:47:17 executing program 4:
unshare(0x60000000)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0)
accept4$inet(0xffffffffffffffff, 0x0, 0x0, 0x0)
r0 = socket(0x10, 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f0, &(0x7f0000000080)={'ip_vti0\x00', @ifru_data=&(0x7f0000000000)="b06f31673d3da2b793d4f9a507e3c9133ba7ce8f5e6e538ecf8829b08f7f4aae"})
poll(&(0x7f0000000000)=[{r0}, {}, {0xffffffffffffffff, 0x3}], 0x3, 0x0)
ioctl$sock_ifreq(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00\x00\x00@\x00', @ifru_flags})

03:47:17 executing program 0:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x8000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0)
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x0, 0x2)

03:47:17 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$rxrpc(0x21, 0x2, 0xa)
setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f0000000100)='/dev/kvm\x00', 0x9)

03:47:17 executing program 3:
pipe(&(0x7f00000000c0)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
r2 = socket$inet_udp(0x2, 0x2, 0x0)
close(r2)
write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0)
socket$inet(0x2, 0x3, 0x7f)
r3 = socket$packet(0x11, 0x3, 0x300)
setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x0, 0xfffffffffffffffc}, 0x4)
setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000180)={0x0, &(0x7f00000001c0)}, 0x10)
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
bind$inet(r2, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10)
splice(r0, 0x0, r2, 0x0, 0x10005, 0x0)

03:47:17 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x2, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

03:47:17 executing program 5:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0xfffffdfc, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r5 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r5, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1073.927094] kobject: 'sit0' (00000000b982a3d6): kobject_cleanup, parent           (null)
[ 1073.935355] kobject: 'sit0' (00000000b982a3d6): auto cleanup 'remove' event
[ 1073.942468] kobject: 'sit0' (00000000b982a3d6): kobject_uevent_env
[ 1073.948846] kobject: 'sit0' (00000000b982a3d6): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1073.958942] kobject: 'sit0' (00000000b982a3d6): calling ktype release
[ 1073.965585] kobject: 'sit0': free name
[ 1073.969513] kobject: '' (00000000d38147d6): kobject_cleanup, parent           (null)
[ 1073.998888] kobject: '' (00000000d38147d6): auto cleanup 'remove' event
[ 1074.000016] kobject: 'loop5' (00000000b52baa4c): kobject_uevent_env
[ 1074.010658] kobject: '' (00000000d38147d6): kobject_uevent_env
[ 1074.013198] kobject: 'loop5' (00000000b52baa4c): fill_kobj_path: path = '/devices/virtual/block/loop5'
[ 1074.022405] kobject: '' (00000000d38147d6): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1074.041551] kobject: '' (00000000d38147d6): calling ktype release
03:47:17 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$rxrpc(0x21, 0x2, 0xa)
setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f0000000100)='/dev/kvm\x00', 0x9)

[ 1074.049156] kobject: '': free name
[ 1074.053122] kobject: 'sit0' (0000000046818174): kobject_cleanup, parent           (null)
[ 1074.067038] kobject: 'sit0' (0000000046818174): auto cleanup 'remove' event
[ 1074.076821] kobject: 'sit0' (0000000046818174): kobject_uevent_env
[ 1074.083461] kobject: 'sit0' (0000000046818174): kobject_uevent_env: uevent_suppress caused the event to drop!
03:47:17 executing program 0:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x10000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0)
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x0, 0x2)

[ 1074.114155] kobject: 'loop4' (00000000c75b5a47): kobject_uevent_env
[ 1074.126332] kobject: 'sit0' (0000000046818174): calling ktype release
[ 1074.139110] kobject: 'loop4' (00000000c75b5a47): fill_kobj_path: path = '/devices/virtual/block/loop4'
[ 1074.147550] kobject: 'sit0': free name
[ 1074.154507] kobject: 'loop5' (00000000b52baa4c): kobject_uevent_env
[ 1074.157803] IPVS: ftp: loaded support on port[0] = 21
[ 1074.161263] kobject: 'sit0' (000000000798246a): kobject_cleanup, parent           (null)
[ 1074.168312] kobject: 'loop2' (00000000a30be3ec): kobject_uevent_env
[ 1074.175782] kobject: 'loop5' (00000000b52baa4c): fill_kobj_path: path = '/devices/virtual/block/loop5'
[ 1074.189305] kobject: 'loop2' (00000000a30be3ec): fill_kobj_path: path = '/devices/virtual/block/loop2'
[ 1074.191029] kobject: 'sit0' (000000000798246a): auto cleanup 'remove' event
[ 1074.210569] kobject: 'lo' (0000000074cfef36): kobject_add_internal: parent: 'net', set: 'devices'
[ 1074.220009] kobject: 'sit0' (000000000798246a): kobject_uevent_env
[ 1074.224002] protocol 88fb is buggy, dev hsr_slave_0
[ 1074.226582] kobject: 'sit0' (000000000798246a): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1074.231417] protocol 88fb is buggy, dev hsr_slave_1
[ 1074.242021] kobject: 'lo' (0000000074cfef36): kobject_uevent_env
[ 1074.246551] protocol 88fb is buggy, dev hsr_slave_0
[ 1074.252693] kobject: 'sit0' (000000000798246a): calling ktype release
03:47:17 executing program 2:
r0 = syz_open_dev$usb(&(0x7f0000000400)='/dev/bus/usb/00#/00#\x00', 0x7, 0x0)
ioctl$SIOCNRDECOBS(r0, 0x89e2)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440))
add_key(0x0, 0x0, &(0x7f0000000640)="9cb71e24b0bb6f50a6dc6f63c533eb6c27bd38be519d110af711f1d9d767021c8c92305618b8c5deb7b663f3bfee7695efc496f55c1f9437a4b6d16f38ad5be723ee066cd46431e0faa7f9992da457bc8bcacfd35a416591d429a70972cfff04bf674a3f506aa8aaf6fe998d691be31a65dd124aa279c03534008d9e54423ecdf09b182e6ce0873781f1bab1e9fed35aaecf8c", 0x93, 0xfffffffffffffff9)
r1 = request_key(0x0, 0x0, &(0x7f0000000780)='user\x00', 0xfffffffffffffffb)
syz_mount_image$hfs(&(0x7f0000000000)='hfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[])
r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0xc3, 0x0)
ioctl$TUNGETFILTER(r2, 0x801054db, &(0x7f0000000340)=""/74)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000140)=0xe7f, 0x4)
r3 = add_key$keyring(0x0, &(0x7f0000000580)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8)
add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000000)={'syz', 0x3}, 0x0, 0x0, r1)
r4 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x0, 0x3, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r4, 0x0, 0xfd54)
add_key(&(0x7f00000002c0)='logon\x00', &(0x7f0000000300)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc)
perf_event_open(&(0x7f0000000500)={0x3, 0x70, 0x6, 0x5, 0x9, 0x0, 0x0, 0x0, 0x40, 0x9, 0x9, 0x0, 0x8, 0x0, 0x1, 0x6, 0x5, 0x2, 0x0, 0x0, 0x21, 0x0, 0x0, 0x0, 0x4f0e1827, 0x49b6, 0x0, 0x2, 0xad4f, 0x3f, 0x2be, 0x873, 0x3, 0x0, 0x800, 0x0, 0x0, 0x200, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x100000001}, 0x404, 0x35a1c1a3, 0x100000001}, 0x0, 0xd, 0xffffffffffffffff, 0x8)
keyctl$restrict_keyring(0x1d, r3, 0x0, &(0x7f00000005c0)='vmnet0&\x00\xf6')
r5 = semget$private(0x0, 0x1, 0x400)
semctl$GETPID(r5, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
ioctl$UI_DEV_DESTROY(r0, 0x5502)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x2, 0x2)
r6 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x8000)
renameat(r6, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0)

[ 1074.257706] protocol 88fb is buggy, dev hsr_slave_1
[ 1074.267204] kobject: 'lo' (0000000074cfef36): fill_kobj_path: path = '/devices/virtual/net/lo'
[ 1074.278591] kobject: 'loop1' (00000000243dd996): kobject_uevent_env
[ 1074.298939] kobject: 'loop5' (00000000b52baa4c): kobject_uevent_env
[ 1074.309142] kobject: 'sit0': free name
03:47:17 executing program 0:
ioctl$SIOCNRDECOBS(0xffffffffffffffff, 0x89e2)
add_key(0x0, 0x0, &(0x7f0000000640), 0x0, 0xfffffffffffffff9)
setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x8, 0x0, 0x0)
add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8)
r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_read_part_table(0x3f000000, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="000068000000000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700000000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}])
write(r0, 0x0, 0xfd54)
keyctl$restrict_keyring(0x1d, 0x0, 0x0, 0x0)
semctl$GETPID(0x0, 0x3, 0xb, &(0x7f00000007c0)=""/4096)
mbind(&(0x7f0000012000/0xc00000)=nil, 0xc00000, 0x4000, 0x0, 0x0, 0x2)

03:47:17 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$rxrpc(0x21, 0x2, 0xa)
setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f0000000100)='/dev/kvm\x00', 0x9)

[ 1074.313411] kobject: 'loop1' (00000000243dd996): fill_kobj_path: path = '/devices/virtual/block/loop1'
[ 1074.323092] kobject: 'loop5' (00000000b52baa4c): fill_kobj_path: path = '/devices/virtual/block/loop5'
[ 1074.341051] kobject: 'queues' (0000000035691c7a): kobject_add_internal: parent: 'lo', set: '<NULL>'
[ 1074.376629] kobject: 'loop1' (00000000243dd996): kobject_uevent_env
[ 1074.383102] kobject: 'loop1' (00000000243dd996): fill_kobj_path: path = '/devices/virtual/block/loop1'
[ 1074.417779] kobject: 'queues' (0000000035691c7a): kobject_uevent_env
[ 1074.436127] kobject: 'queues' (0000000035691c7a): kobject_uevent_env: filter function caused the event to drop!
[ 1074.441519] kobject: 'loop5' (00000000b52baa4c): kobject_uevent_env
[ 1074.454503] kobject: 'loop5' (00000000b52baa4c): kobject_uevent_env
03:47:17 executing program 1:
perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
r0 = socket$rxrpc(0x21, 0x2, 0xa)
setsockopt$RXRPC_SECURITY_KEY(r0, 0x110, 0x1, &(0x7f0000000100)='/dev/kvm\x00', 0x9)

[ 1074.465770] kobject: 'rx-0' (00000000357a20fb): kobject_add_internal: parent: 'queues', set: 'queues'
[ 1074.475652] kobject: 'loop5' (00000000b52baa4c): fill_kobj_path: path = '/devices/virtual/block/loop5'
[ 1074.485472] kobject: 'loop5' (00000000b52baa4c): fill_kobj_path: path = '/devices/virtual/block/loop5'
[ 1074.487936] kobject: 'rx-0' (00000000357a20fb): kobject_uevent_env
[ 1074.510623] kobject: 'rx-0' (00000000357a20fb): fill_kobj_path: path = '/devices/virtual/net/lo/queues/rx-0'
[ 1074.529588] kobject: 'tx-0' (00000000c4f8f030): kobject_add_internal: parent: 'queues', set: 'queues'
[ 1074.533670] kobject: 'loop2' (00000000a30be3ec): kobject_uevent_env
[ 1074.567740] kobject: 'tx-0' (00000000c4f8f030): kobject_uevent_env
[ 1074.575392] kobject: 'tx-0' (00000000c4f8f030): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0'
[ 1074.590314] kobject: 'loop2' (00000000a30be3ec): fill_kobj_path: path = '/devices/virtual/block/loop2'
[ 1074.597269] kobject: '' (0000000069798d68): kobject_cleanup, parent           (null)
[ 1074.608195] kobject: 'tunl0' (000000009fd2f6fa): kobject_add_internal: parent: 'net', set: 'devices'
[ 1074.612518] kobject: 'loop2' (00000000a30be3ec): kobject_uevent_env
[ 1074.620201] kobject: '' (0000000069798d68): auto cleanup 'remove' event
[ 1074.630876] kobject: '' (0000000069798d68): kobject_uevent_env
[ 1074.641567] kobject: 'loop2' (00000000a30be3ec): fill_kobj_path: path = '/devices/virtual/block/loop2'
[ 1074.644029] kobject: '' (0000000069798d68): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1074.652204] kobject: 'loop1' (00000000243dd996): kobject_uevent_env
[ 1074.664109] kobject: 'tunl0' (000000009fd2f6fa): kobject_uevent_env
[ 1074.670201] kobject: 'loop1' (00000000243dd996): fill_kobj_path: path = '/devices/virtual/block/loop1'
[ 1074.675884] kobject: 'tunl0' (000000009fd2f6fa): fill_kobj_path: path = '/devices/virtual/net/tunl0'
[ 1074.684322] kobject: '' (0000000069798d68): calling ktype release
[ 1074.692879] kobject: 'queues' (000000006416942c): kobject_add_internal: parent: 'tunl0', set: '<NULL>'
[ 1074.711997] kobject: '': free name
[ 1074.718540] kobject: 'queues' (000000006416942c): kobject_uevent_env
[ 1074.725976] kobject: 'queues' (000000006416942c): kobject_uevent_env: filter function caused the event to drop!
[ 1074.736407] kobject: 'rx-0' (00000000110f5163): kobject_add_internal: parent: 'queues', set: 'queues'
[ 1074.746049] kobject: 'rx-0' (00000000110f5163): kobject_uevent_env
[ 1074.752499] kobject: 'rx-0' (00000000110f5163): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/rx-0'
[ 1074.762909] kobject: 'tx-0' (000000001bd77545): kobject_add_internal: parent: 'queues', set: 'queues'
[ 1074.772800] kobject: 'tx-0' (000000001bd77545): kobject_uevent_env
[ 1074.779195] kobject: 'tx-0' (000000001bd77545): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/tx-0'
[ 1074.789951] kobject: 'gre0' (000000008af2621d): kobject_add_internal: parent: 'net', set: 'devices'
[ 1074.807163] kobject: 'gre0' (000000008af2621d): kobject_uevent_env
[ 1074.813809] kobject: 'gre0' (000000008af2621d): fill_kobj_path: path = '/devices/virtual/net/gre0'
[ 1074.823553] kobject: 'queues' (00000000dbbeccee): kobject_add_internal: parent: 'gre0', set: '<NULL>'
[ 1074.835673] kobject: 'queues' (00000000dbbeccee): kobject_uevent_env
[ 1074.842652] kobject: 'queues' (00000000dbbeccee): kobject_uevent_env: filter function caused the event to drop!
[ 1074.855627] kobject: 'rx-0' (0000000058b3d5a7): kobject_add_internal: parent: 'queues', set: 'queues'
[ 1074.866436] kobject: 'rx-0' (0000000058b3d5a7): kobject_uevent_env
[ 1074.873082] kobject: 'rx-0' (0000000058b3d5a7): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/rx-0'
[ 1074.885904] kobject: 'tx-0' (000000008c073113): kobject_add_internal: parent: 'queues', set: 'queues'
[ 1074.895901] kobject: 'tx-0' (000000008c073113): kobject_uevent_env
[ 1074.902623] kobject: 'tx-0' (000000008c073113): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/tx-0'
[ 1074.915228] kobject: 'rx-0' (00000000838561bd): kobject_cleanup, parent 0000000028e9c764
[ 1074.920423] kobject: 'loop3' (0000000063865547): kobject_uevent_env
[ 1074.923522] kobject: 'rx-0' (00000000838561bd): auto cleanup 'remove' event
[ 1074.932022] kobject: 'loop3' (0000000063865547): fill_kobj_path: path = '/devices/virtual/block/loop3'
[ 1074.939140] kobject: 'rx-0' (00000000838561bd): kobject_uevent_env
[ 1074.949381] IPVS: ftp: loaded support on port[0] = 21
[ 1074.953148] kobject: 'rx-0' (00000000838561bd): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1074.969092] kobject: 'rx-0' (00000000838561bd): auto cleanup kobject_del
[ 1074.976179] kobject: 'rx-0' (00000000838561bd): calling ktype release
[ 1074.982777] kobject: 'rx-0': free name
[ 1074.987022] kobject: 'tx-0' (00000000dbdb033f): kobject_cleanup, parent 0000000028e9c764
[ 1074.995302] kobject: 'tx-0' (00000000dbdb033f): auto cleanup 'remove' event
[ 1075.002417] kobject: 'tx-0' (00000000dbdb033f): kobject_uevent_env
[ 1075.008978] kobject: 'tx-0' (00000000dbdb033f): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1075.019149] kobject: 'tx-0' (00000000dbdb033f): auto cleanup kobject_del
[ 1075.026125] kobject: 'tx-0' (00000000dbdb033f): calling ktype release
[ 1075.032721] kobject: 'tx-0': free name
[ 1075.036679] kobject: 'queues' (0000000028e9c764): kobject_cleanup, parent           (null)
[ 1075.045463] kobject: 'queues' (0000000028e9c764): calling ktype release
[ 1075.052225] kobject: 'queues' (0000000028e9c764): kset_release
[ 1075.058267] kobject: 'queues': free name
[ 1075.062652] kobject: 'ip6_vti0' (0000000066777d82): kobject_uevent_env
[ 1075.069427] kobject: 'ip6_vti0' (0000000066777d82): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1075.080584] kobject: 'rx-0' (00000000f2501358): kobject_cleanup, parent 000000001070fc5c
[ 1075.088902] kobject: 'rx-0' (00000000f2501358): auto cleanup 'remove' event
[ 1075.096341] kobject: 'rx-0' (00000000f2501358): kobject_uevent_env
[ 1075.102669] kobject: 'rx-0' (00000000f2501358): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1075.112806] kobject: 'rx-0' (00000000f2501358): auto cleanup kobject_del
[ 1075.119887] kobject: 'rx-0' (00000000f2501358): calling ktype release
[ 1075.126498] kobject: 'rx-0': free name
[ 1075.130446] kobject: 'tx-0' (00000000fa47eedb): kobject_cleanup, parent 000000001070fc5c
[ 1075.138754] kobject: 'tx-0' (00000000fa47eedb): auto cleanup 'remove' event
[ 1075.145880] kobject: 'tx-0' (00000000fa47eedb): kobject_uevent_env
[ 1075.152192] kobject: 'tx-0' (00000000fa47eedb): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1075.162312] kobject: 'tx-0' (00000000fa47eedb): auto cleanup kobject_del
[ 1075.169197] kobject: 'tx-0' (00000000fa47eedb): calling ktype release
[ 1075.175948] kobject: 'tx-0': free name
[ 1075.179855] kobject: 'queues' (000000001070fc5c): kobject_cleanup, parent           (null)
[ 1075.188299] kobject: 'queues' (000000001070fc5c): calling ktype release
[ 1075.195093] kobject: 'queues' (000000001070fc5c): kset_release
[ 1075.201062] kobject: 'queues': free name
[ 1075.205415] kobject: 'ip6_vti0' (00000000f461c3d2): kobject_uevent_env
[ 1075.213579] kobject: 'ip6_vti0' (00000000f461c3d2): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1075.224819] kobject: 'rx-0' (000000003251c162): kobject_cleanup, parent 00000000d2854296
[ 1075.233049] kobject: 'rx-0' (000000003251c162): auto cleanup 'remove' event
[ 1075.240795] kobject: 'rx-0' (000000003251c162): kobject_uevent_env
[ 1075.247144] kobject: 'rx-0' (000000003251c162): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1075.257230] kobject: 'rx-0' (000000003251c162): auto cleanup kobject_del
[ 1075.264114] kobject: 'rx-0' (000000003251c162): calling ktype release
[ 1075.270708] kobject: 'rx-0': free name
[ 1075.274666] kobject: 'tx-0' (000000008ebf9869): kobject_cleanup, parent 00000000d2854296
[ 1075.282990] kobject: 'tx-0' (000000008ebf9869): auto cleanup 'remove' event
[ 1075.290124] kobject: 'tx-0' (000000008ebf9869): kobject_uevent_env
[ 1075.296490] kobject: 'tx-0' (000000008ebf9869): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1075.306564] kobject: 'tx-0' (000000008ebf9869): auto cleanup kobject_del
[ 1075.313426] kobject: 'tx-0' (000000008ebf9869): calling ktype release
[ 1075.320022] kobject: 'tx-0': free name
[ 1075.323939] kobject: 'queues' (00000000d2854296): kobject_cleanup, parent           (null)
[ 1075.332389] kobject: 'queues' (00000000d2854296): calling ktype release
[ 1075.339314] kobject: 'queues' (00000000d2854296): kset_release
[ 1075.345323] kobject: 'queues': free name
[ 1075.349586] kobject: 'ip6_vti0' (00000000b308458c): kobject_uevent_env
[ 1075.356491] kobject: 'ip6_vti0' (00000000b308458c): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1075.367527] kobject: 'rx-0' (00000000a4630e22): kobject_cleanup, parent 000000008b339d16
[ 1075.375810] kobject: 'rx-0' (00000000a4630e22): auto cleanup 'remove' event
[ 1075.382908] kobject: 'rx-0' (00000000a4630e22): kobject_uevent_env
[ 1075.389257] kobject: 'rx-0' (00000000a4630e22): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1075.399342] kobject: 'rx-0' (00000000a4630e22): auto cleanup kobject_del
[ 1075.406228] kobject: 'rx-0' (00000000a4630e22): calling ktype release
[ 1075.412803] kobject: 'rx-0': free name
[ 1075.416759] kobject: 'tx-0' (0000000065c173c9): kobject_cleanup, parent 000000008b339d16
[ 1075.425021] kobject: 'tx-0' (0000000065c173c9): auto cleanup 'remove' event
[ 1075.432122] kobject: 'tx-0' (0000000065c173c9): kobject_uevent_env
[ 1075.438474] kobject: 'tx-0' (0000000065c173c9): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1075.448551] kobject: 'tx-0' (0000000065c173c9): auto cleanup kobject_del
[ 1075.455474] kobject: 'tx-0' (0000000065c173c9): calling ktype release
[ 1075.462057] kobject: 'tx-0': free name
[ 1075.466001] kobject: 'queues' (000000008b339d16): kobject_cleanup, parent           (null)
[ 1075.474453] kobject: 'queues' (000000008b339d16): calling ktype release
[ 1075.481211] kobject: 'queues' (000000008b339d16): kset_release
[ 1075.487471] kobject: 'queues': free name
[ 1075.491758] kobject: 'ip6_vti0' (00000000fca7e1b6): kobject_uevent_env
[ 1075.498975] kobject: 'ip6_vti0' (00000000fca7e1b6): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1075.509847] kobject: 'gretap0' (0000000078ab82d5): kobject_add_internal: parent: 'net', set: 'devices'
[ 1075.519881] kobject: 'gretap0' (0000000078ab82d5): kobject_uevent_env
[ 1075.527375] kobject: 'gretap0' (0000000078ab82d5): fill_kobj_path: path = '/devices/virtual/net/gretap0'
[ 1075.537240] kobject: 'queues' (0000000005101a6f): kobject_add_internal: parent: 'gretap0', set: '<NULL>'
[ 1075.546910] kobject: 'queues' (0000000005101a6f): kobject_uevent_env
[ 1075.553406] kobject: 'queues' (0000000005101a6f): kobject_uevent_env: filter function caused the event to drop!
[ 1075.563685] kobject: 'rx-0' (0000000091041b06): kobject_add_internal: parent: 'queues', set: 'queues'
[ 1075.573104] kobject: 'rx-0' (0000000091041b06): kobject_uevent_env
[ 1075.579481] kobject: 'rx-0' (0000000091041b06): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/rx-0'
[ 1075.589984] kobject: 'tx-0' (00000000d715ff4a): kobject_add_internal: parent: 'queues', set: 'queues'
[ 1075.599482] kobject: 'tx-0' (00000000d715ff4a): kobject_uevent_env
[ 1075.605870] kobject: 'tx-0' (00000000d715ff4a): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/tx-0'
[ 1075.617072] kobject: 'batman_adv' (00000000af0ac621): kobject_add_internal: parent: 'gretap0', set: '<NULL>'
[ 1075.627559] kobject: 'erspan0' (00000000ec149928): kobject_add_internal: parent: 'net', set: 'devices'
[ 1075.637489] kobject: 'erspan0' (00000000ec149928): kobject_uevent_env
[ 1075.644145] kobject: 'erspan0' (00000000ec149928): fill_kobj_path: path = '/devices/virtual/net/erspan0'
[ 1075.653834] kobject: 'queues' (00000000657dea1c): kobject_add_internal: parent: 'erspan0', set: '<NULL>'
[ 1075.663763] kobject: 'queues' (00000000657dea1c): kobject_uevent_env
[ 1075.670317] kobject: 'queues' (00000000657dea1c): kobject_uevent_env: filter function caused the event to drop!
[ 1075.680757] kobject: 'rx-0' (00000000749d5260): kobject_add_internal: parent: 'queues', set: 'queues'
[ 1075.690191] kobject: 'rx-0' (00000000749d5260): kobject_uevent_env
[ 1075.696556] kobject: 'rx-0' (00000000749d5260): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/rx-0'
[ 1075.707080] kobject: 'tx-0' (00000000bf744a1e): kobject_add_internal: parent: 'queues', set: 'queues'
[ 1075.716543] kobject: 'tx-0' (00000000bf744a1e): kobject_uevent_env
[ 1075.722872] kobject: 'tx-0' (00000000bf744a1e): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/tx-0'
[ 1075.734127] kobject: 'batman_adv' (00000000b8db60f6): kobject_add_internal: parent: 'erspan0', set: '<NULL>'
[ 1075.748023] kobject: 'ip6_vti0' (0000000066777d82): kobject_cleanup, parent           (null)
[ 1075.748327] kobject: 'ip_vti0' (0000000065ec5c1a): kobject_add_internal: parent: 'net', set: 'devices'
[ 1075.761071] kobject: 'ip6_vti0' (0000000066777d82): auto cleanup 'remove' event
[ 1075.766635] kobject: 'ip_vti0' (0000000065ec5c1a): kobject_uevent_env
[ 1075.773923] kobject: 'ip6_vti0' (0000000066777d82): kobject_uevent_env
[ 1075.780276] kobject: 'ip_vti0' (0000000065ec5c1a): fill_kobj_path: path = '/devices/virtual/net/ip_vti0'
[ 1075.780353] kobject: 'queues' (00000000e79d8662): kobject_add_internal: parent: 'ip_vti0', set: '<NULL>'
[ 1075.789476] kobject: 'ip6_vti0' (0000000066777d82): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1075.796680] kobject: 'queues' (00000000e79d8662): kobject_uevent_env
[ 1075.808512] kobject: 'ip6_vti0' (0000000066777d82): calling ktype release
[ 1075.816755] kobject: 'queues' (00000000e79d8662): kobject_uevent_env: filter function caused the event to drop!
[ 1075.816783] kobject: 'rx-0' (00000000dd9c5d4e): kobject_add_internal: parent: 'queues', set: 'queues'
[ 1075.816829] kobject: 'rx-0' (00000000dd9c5d4e): kobject_uevent_env
[ 1075.824540] kobject: 'ip6_vti0': free name
[ 1075.830281] kobject: 'rx-0' (00000000dd9c5d4e): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/rx-0'
[ 1075.830360] kobject: 'tx-0' (00000000dd8525f1): kobject_add_internal: parent: 'queues', set: 'queues'
[ 1075.880629] kobject: 'tx-0' (00000000dd8525f1): kobject_uevent_env
[ 1075.887022] kobject: 'tx-0' (00000000dd8525f1): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/tx-0'
[ 1075.946183] kobject: 'ip6_vti0' (00000000f461c3d2): kobject_cleanup, parent           (null)
[ 1075.955396] kobject: 'rx-0' (00000000dd9c5d4e): kobject_cleanup, parent 00000000e79d8662
[ 1075.963648] kobject: 'rx-0' (00000000dd9c5d4e): auto cleanup 'remove' event
[ 1075.972887] kobject: 'ip6_vti0' (00000000f461c3d2): auto cleanup 'remove' event
[ 1075.980440] kobject: 'ip6_vti0' (00000000f461c3d2): kobject_uevent_env
[ 1075.989291] kobject: 'rx-0' (00000000dd9c5d4e): kobject_uevent_env
[ 1075.995694] kobject: 'ip6_vti0' (00000000f461c3d2): kobject_uevent_env: uevent_suppress caused the event to drop!
[ 1076.008731] kobject: 'rx-0' (00000000dd9c5d4e): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/rx-0'
[ 1076.019228] kobject: 'ip6_vti0' (00000000f461c3d2): calling ktype release
[ 1076.028331] kobject: 'ip6_vti0': free name
[ 1076.032732] kobject: 'rx-0' (00000000dd9c5d4e): auto cleanup kobject_del
[ 1076.039710] kobject: 'rx-0' (00000000dd9c5d4e): calling ktype release
[ 1076.048650] kobject: 'rx-0': free name
[ 1076.052666] kobject: 'tx-0' (00000000dd8525f1): kobject_cleanup, parent 00000000e79d8662
[ 1076.061113] kobject: 'tx-0' (00000000dd8525f1): auto cleanup 'remove' event
[ 1076.070892] kobject: 'tx-0' (00000000dd8525f1): kobject_uevent_env
[ 1076.077384] kobject: 'tx-0' (00000000dd8525f1): fill_kobj_path: path = '/devices/virtual/