bf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff00000000680001006e6574656d0000005c0002"], 0x8c}}, 0x0) [ 1135.508192][T29780] loop4: p1 < > p2 p3 p4 [ 1135.513178][T29780] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1135.522512][T29780] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1135.538882][ T1440] loop0: p1 < > p2 p3 p4 [ 1135.543234][ T1440] loop0: partition table partially beyond EOD, truncated [ 1135.550458][ T1440] loop0: p1 start 1 is beyond EOD, truncated 06:42:12 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700480000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:42:12 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a2501006e6574656d0000005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1135.556464][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1135.563854][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1135.568288][T29792] loop1: detected capacity change from 0 to 264192 [ 1135.571711][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:12 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004008ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:12 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000004024000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1135.612670][ T1440] loop4: p1 < > p2 p3 p4 [ 1135.617725][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1135.625623][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:42:12 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff0000004cc40001006e6574656d0000005c0002"], 0x8c}}, 0x0) [ 1135.671436][ T1440] loop0: p1 < > p2 p3 p4 [ 1135.675820][ T1440] loop0: partition table partially beyond EOD, truncated [ 1135.682917][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1135.688933][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1135.697748][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1135.709937][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:12 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000040004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:12 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a2c01006e6574656d0000005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1135.733694][ T1440] loop0: p1 < > p2 p3 p4 [ 1135.738084][ T1440] loop0: partition table partially beyond EOD, truncated [ 1135.745164][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1135.751162][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1135.759528][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1135.762211][T29803] loop5: detected capacity change from 0 to 264192 [ 1135.769458][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1135.806713][T29810] loop4: detected capacity change from 0 to 264192 [ 1135.819387][ T1440] loop0: p1 < > p2 p3 p4 [ 1135.821950][T29811] loop1: detected capacity change from 0 to 264192 [ 1135.823745][ T1440] loop0: partition table partially beyond EOD, truncated [ 1135.835121][T29810] loop4: p1 < > p2 p3 p4 [ 1135.837380][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1135.842287][T29810] loop4: p2 size 1073741824 extends beyond EOD, 06:42:13 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004009ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1135.847614][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1135.849983][ T1440] loop0: p3 size 1912633224 extends beyond EOD, [ 1135.853968][T29810] truncated [ 1135.856770][T29810] loop4: p3 size 1912633224 extends beyond EOD, [ 1135.861567][ T1440] truncated [ 1135.867875][T29810] truncated [ 1135.877632][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:13 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000034000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1135.905587][ T1440] loop0: p1 < > p2 p3 p4 [ 1135.909944][ T1440] loop0: partition table partially beyond EOD, truncated [ 1135.917144][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1135.923151][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1135.930632][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1135.939859][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1135.942588][T29812] loop4: detected capacity change from 0 to 264192 06:42:13 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff00000000040001006e6574656d0000005c0002"], 0x8c}}, 0x0) [ 1135.986787][ T1440] loop4: p1 < > p2 p3 p4 [ 1135.991651][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1135.999176][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1136.008545][T29812] loop4: p1 < > p2 p3 p4 [ 1136.013204][T29812] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1136.020894][T29812] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:42:13 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000080040004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:13 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff07004c0000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1136.087656][ T1440] loop4: p1 < > p2 p3 p4 [ 1136.093260][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1136.101138][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:42:13 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a4801006e6574656d0000005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1136.153017][T29826] loop5: detected capacity change from 0 to 264192 [ 1136.173649][ T1440] loop0: p1 < > p2 p3 p4 [ 1136.178011][ T1440] loop0: partition table partially beyond EOD, truncated [ 1136.185069][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1136.185237][T29828] loop1: detected capacity change from 0 to 264192 06:42:13 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff00000000050001006e6574656d0000005c0002"], 0x8c}}, 0x0) 06:42:13 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff070000000000006300080000000000000000400affffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1136.191047][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1136.205950][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1136.213546][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1136.227806][ T1440] loop4: p1 < > p2 p3 p4 [ 1136.233246][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1136.241023][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:42:13 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000002044000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:13 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000073004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:13 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a4c01006e6574656d0000005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1136.316169][ T1440] loop0: p1 < > p2 p3 p4 [ 1136.320588][ T1440] loop0: partition table partially beyond EOD, truncated [ 1136.327770][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1136.333738][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1136.349093][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1136.357020][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1136.377739][ T1440] loop0: p1 < > p2 p3 p4 [ 1136.382175][ T1440] loop0: partition table partially beyond EOD, truncated [ 1136.389321][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1136.395377][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1136.402912][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1136.410538][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1136.429866][ T1440] loop0: p1 < > p2 p3 p4 [ 1136.434199][ T1440] loop0: partition table partially beyond EOD, truncated [ 1136.441264][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1136.447387][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1136.450139][T29841] loop4: detected capacity change from 0 to 264192 [ 1136.455032][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1136.469093][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:13 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000e0001006e6574656d0000005c0002"], 0x8c}}, 0x0) [ 1136.484712][T29844] loop5: detected capacity change from 0 to 264192 [ 1136.507567][ T1440] loop4: p1 < > p2 p3 p4 [ 1136.512430][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1136.520579][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:42:13 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff070000000000006300080000000000000000400bffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1136.531017][T29841] loop4: p1 < > p2 p3 p4 [ 1136.536007][T29841] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1136.543530][T29841] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1136.553523][ T1440] loop4: p1 < > p2 p3 p4 [ 1136.558382][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1136.566004][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1136.585383][ T1440] loop0: p1 < > p2 p3 p4 [ 1136.589935][ T1440] loop0: partition table partially beyond EOD, truncated [ 1136.597092][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1136.603138][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1136.610712][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1136.611410][T29845] loop4: detected capacity change from 0 to 264192 [ 1136.621461][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:13 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000f0ff7f004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1136.634849][T29850] loop1: detected capacity change from 0 to 264192 [ 1136.665259][ T1440] loop4: p1 < > p2 p3 p4 [ 1136.670006][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1136.677609][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:42:13 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700550000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:42:13 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000006044000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:13 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a5801006e6574656d0000005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1136.687469][ T1440] loop4: p1 < > p2 p3 p4 [ 1136.692261][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1136.700856][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1136.711329][T29845] loop4: p1 < > p2 p3 p4 [ 1136.717268][T29845] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1136.724877][T29845] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1136.767261][ T1440] loop0: p1 < > p2 p3 p4 [ 1136.771698][ T1440] loop0: partition table partially beyond EOD, truncated [ 1136.779003][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1136.785076][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1136.792514][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1136.800924][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:13 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff00000000250001006e6574656d0000005c0002"], 0x8c}}, 0x0) 06:42:14 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000380004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1136.821706][ T1440] loop4: p1 < > p2 p3 p4 [ 1136.826632][T29861] loop5: detected capacity change from 0 to 264192 [ 1136.826811][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1136.841480][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:42:14 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff070000000000006300080000000000000000400cffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1136.904715][T29865] loop1: detected capacity change from 0 to 264192 [ 1136.925128][ T1440] loop0: p1 < > p2 p3 p4 [ 1136.929533][ T1440] loop0: partition table partially beyond EOD, truncated [ 1136.936697][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1136.942753][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated 06:42:14 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a6001006e6574656d0000005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1136.954759][T29871] loop4: detected capacity change from 0 to 264192 [ 1136.958020][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1136.968865][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:14 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff00000000680001006e6574656d0000005c0002"], 0x8c}}, 0x0) 06:42:14 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000054000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:14 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000083004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1137.006284][ T1440] loop4: p1 < > p2 p3 p4 [ 1137.011687][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1137.021670][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1137.031310][T29871] loop4: p1 < > p2 p3 p4 [ 1137.037082][T29871] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1137.044724][T29871] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1137.061738][ T1440] loop0: p1 < > p2 p3 p4 [ 1137.066102][ T1440] loop0: partition table partially beyond EOD, truncated [ 1137.073171][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1137.079158][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1137.086655][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1137.094260][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1137.109022][ T1440] loop0: p1 < > p2 p3 p4 [ 1137.113350][ T1440] loop0: partition table partially beyond EOD, truncated [ 1137.114198][T29876] loop4: detected capacity change from 0 to 264192 [ 1137.120495][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1137.133040][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1137.140622][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1137.148195][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1137.185236][ T1440] loop4: p1 < > p2 p3 p4 [ 1137.189910][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1137.197434][T29880] loop5: detected capacity change from 0 to 264192 [ 1137.198001][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1137.213412][T29876] loop4: p1 < > p2 p3 p4 [ 1137.219298][T29876] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1137.226823][T29876] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:42:14 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a6801006e6574656d0000005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:14 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700600000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:42:14 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff070000000000006300080000000000000000400dffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:14 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff00000000570101006e6574656d0000005c0002"], 0x8c}}, 0x0) [ 1137.288060][ T1440] loop4: p1 < > p2 p3 p4 [ 1137.292998][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1137.305039][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1137.316491][T29889] loop1: detected capacity change from 0 to 264192 06:42:14 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff07000000000000630008000000ffffff85004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:14 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff070000000000006300080000000000009f054000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1137.370955][ T1440] loop0: p1 < > p2 p3 p4 [ 1137.375339][ T1440] loop0: partition table partially beyond EOD, truncated [ 1137.382611][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1137.388713][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1137.396385][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1137.403914][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1137.487537][T29899] loop5: detected capacity change from 0 to 264192 [ 1137.497506][ T1440] loop0: p1 < > p2 p3 p4 [ 1137.501907][ T1440] loop0: partition table partially beyond EOD, truncated [ 1137.509241][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1137.515244][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1137.522818][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1137.530382][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:14 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a6c01006e6574656d0000005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:14 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff00000000c44c01006e6574656d0000005c0002"], 0x8c}}, 0x0) 06:42:14 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff07000000000000630008000000fffffdef004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1137.540519][T29905] loop4: detected capacity change from 0 to 264192 [ 1137.565564][ T1440] loop0: p1 < > p2 p3 p4 [ 1137.569949][ T1440] loop0: partition table partially beyond EOD, truncated [ 1137.577044][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1137.583140][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated 06:42:14 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff070000000000006300080000000000000000400effffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1137.591342][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1137.591781][T29905] loop4: p1 < > p2 p3 p4 [ 1137.599239][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1137.618022][T29909] loop1: detected capacity change from 0 to 264192 [ 1137.630192][T29905] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1137.640990][T29905] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:42:14 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000000000630008000000000000c5054000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1137.697014][T29908] loop4: detected capacity change from 0 to 264192 [ 1137.728637][T29908] loop4: p1 < > p2 p3 p4 [ 1137.732725][ T1440] loop0: p1 < > p2 p3 p4 [ 1137.734023][T29908] loop4: p2 size 1073741824 extends beyond EOD, truncated 06:42:14 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700680000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1137.737350][ T1440] loop0: partition table partially beyond EOD, truncated [ 1137.746209][T29908] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1137.751567][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1137.764563][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1137.772075][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1137.782377][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:14 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0400006e6574656d0000005c0002"], 0x8c}}, 0x0) 06:42:14 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a7401006e6574656d0000005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:14 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff07000000000000630008000000fffffff6004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1137.808634][ T1440] loop4: p1 < > p2 p3 p4 [ 1137.817277][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1137.825061][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1137.858613][T29921] loop5: detected capacity change from 0 to 264192 [ 1137.899588][ T1440] loop0: p1 < > p2 p3 p4 [ 1137.903921][ T1440] loop0: partition table partially beyond EOD, truncated [ 1137.911027][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1137.917009][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1137.925945][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1137.927929][T29924] loop1: detected capacity change from 0 to 264192 [ 1137.933526][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:15 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff070000000000006300080000000000000000400fffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:15 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0201006e6574656d0000005c0002"], 0x8c}}, 0x0) [ 1137.967587][ T1440] loop0: p1 < > p2 p3 p4 [ 1137.971934][ T1440] loop0: partition table partially beyond EOD, truncated [ 1137.979081][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1137.985177][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1137.992859][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1137.998332][T29929] loop4: detected capacity change from 0 to 264192 [ 1138.000600][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:15 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff07000000000000630008000000fffffdfc004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:15 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000064000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:15 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a7a01006e6574656d0000005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1138.056091][T29929] loop4: p1 < > p2 p3 p4 [ 1138.062141][T29929] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1138.072086][T29929] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1138.072830][ T1440] loop0: p1 < > p2 p3 p4 [ 1138.083569][ T1440] loop0: partition table partially beyond EOD, truncated [ 1138.090878][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1138.096872][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated 06:42:15 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004010ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:15 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0301006e6574656d0000005c0002"], 0x8c}}, 0x0) [ 1138.104255][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1138.111840][T29938] loop5: detected capacity change from 0 to 264192 [ 1138.112702][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1138.136399][T29935] loop4: detected capacity change from 0 to 264192 [ 1138.185557][T29935] loop4: p1 < > p2 p3 p4 [ 1138.190371][T29935] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1138.199000][T29935] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:42:15 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff07006c0000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:42:15 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff07000000000000630008000000fffffdfd004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:15 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0003006e6574656d0000005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1138.239325][T29945] loop1: detected capacity change from 0 to 264192 [ 1138.248077][ T1440] loop4: p1 < > p2 p3 p4 [ 1138.256240][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1138.271944][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:42:15 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000004064000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:15 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0401006e6574656d0000005c0002"], 0x8c}}, 0x0) 06:42:15 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004011ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1138.303843][T29953] loop5: detected capacity change from 0 to 264192 06:42:15 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a000a006e6574656d0000005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1138.388529][ T1440] loop0: p1 < > p2 p3 p4 [ 1138.392856][ T1440] loop0: partition table partially beyond EOD, truncated [ 1138.399988][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1138.406017][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1138.419265][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1138.427401][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:15 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff07000000000000630008000000fffffffe004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1138.466529][ T1440] loop0: p1 < > p2 p3 p4 [ 1138.470861][ T1440] loop0: partition table partially beyond EOD, truncated [ 1138.477949][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1138.483969][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1138.486907][T29968] loop1: detected capacity change from 0 to 264192 [ 1138.494304][T29969] loop4: detected capacity change from 0 to 264192 [ 1138.501916][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:42:15 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0501006e6574656d0000005c0002"], 0x8c}}, 0x0) [ 1138.512164][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1138.536245][T29969] loop4: p1 < > p2 p3 p4 [ 1138.538608][T29972] loop5: detected capacity change from 0 to 264192 [ 1138.541178][T29969] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1138.547303][ T1440] loop0: p1 < > p2 p3 p4 [ 1138.556055][T29969] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:42:15 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000074000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1138.558577][ T1440] loop0: partition table partially beyond EOD, truncated [ 1138.572879][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1138.578977][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1138.586737][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1138.594444][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1138.617566][ T1440] loop0: p1 < > p2 p3 p4 [ 1138.621908][ T1440] loop0: partition table partially beyond EOD, truncated [ 1138.623910][T29973] loop4: detected capacity change from 0 to 264192 [ 1138.629652][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1138.642024][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1138.649529][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1138.657375][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:15 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004012ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1138.675217][T29973] loop4: p1 < > p2 p3 p4 [ 1138.681326][T29973] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1138.689024][T29973] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:42:15 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700740000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:42:15 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a000f006e6574656d0000005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:15 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff07000000000000630008000000effdffff004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:15 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0601006e6574656d0000005c0002"], 0x8c}}, 0x0) [ 1138.759130][ T1440] loop4: p1 < > p2 p3 p4 [ 1138.774388][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1138.796287][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1138.826968][T29986] loop1: detected capacity change from 0 to 264192 [ 1138.833979][T29987] loop5: detected capacity change from 0 to 264192 [ 1138.844468][ T1440] loop4: p1 < > p2 p3 p4 [ 1138.849240][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1138.856657][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1138.904255][ T1440] loop0: p1 < > p2 p3 p4 [ 1138.908639][ T1440] loop0: partition table partially beyond EOD, truncated [ 1138.915713][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1138.921756][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1138.929524][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1138.937961][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:16 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004025ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:16 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000094000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:16 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0025006e6574656d0000005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:16 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff07000000000000630008000000fcfdffff004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:16 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0701006e6574656d0000005c0002"], 0x8c}}, 0x0) [ 1138.993919][T29999] loop4: detected capacity change from 0 to 264192 [ 1139.002987][ T1440] loop0: p1 < > p2 p3 p4 [ 1139.007352][ T1440] loop0: partition table partially beyond EOD, truncated [ 1139.014375][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1139.020396][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1139.027953][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1139.035470][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1139.053646][ T1440] loop0: p1 < > p2 p3 p4 [ 1139.058166][ T1440] loop0: partition table partially beyond EOD, truncated [ 1139.065261][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1139.071306][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1139.079201][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1139.080976][T29999] loop4: p1 < > p2 p3 p4 [ 1139.087421][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1139.091144][T29999] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1139.105216][T29999] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1139.114171][ T1440] loop4: p1 < > p2 p3 p4 [ 1139.119039][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1139.126627][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1139.141303][ T1440] loop0: p1 < > p2 p3 p4 [ 1139.145700][ T1440] loop0: partition table partially beyond EOD, truncated [ 1139.152786][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1139.158839][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1139.166801][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1139.174250][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:16 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0801006e6574656d0000005c0002"], 0x8c}}, 0x0) 06:42:16 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0002006e6574656d0000005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1139.201596][T30009] loop5: detected capacity change from 0 to 264192 [ 1139.206108][T30008] loop1: detected capacity change from 0 to 264192 [ 1139.220624][T30000] loop4: detected capacity change from 0 to 264192 06:42:16 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004048ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1139.255281][T30000] loop4: p1 < > p2 p3 p4 [ 1139.260894][T30000] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1139.269476][T30000] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1139.278056][ T1440] loop0: p1 < > p2 p3 p4 [ 1139.282434][ T1440] loop0: partition table partially beyond EOD, truncated [ 1139.289517][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1139.295564][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1139.303093][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1139.310789][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1139.329349][ T1440] loop0: p1 < > p2 p3 p4 [ 1139.333869][ T1440] loop0: partition table partially beyond EOD, truncated [ 1139.341221][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1139.347229][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated 06:42:16 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700780000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:42:16 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff07000000000000630008000000fdfdffff004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:16 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000000000630008000000000000000a4000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:16 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0901006e6574656d0000005c0002"], 0x8c}}, 0x0) [ 1139.354743][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1139.363529][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1139.382459][ T1440] loop4: p1 < > p2 p3 p4 [ 1139.387406][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1139.394872][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:42:16 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0003006e6574656d0000005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:16 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000085ffffff004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1139.428336][T30026] loop5: detected capacity change from 0 to 264192 06:42:16 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff070000000000006300080000000000000000404cffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1139.496039][T30029] loop1: detected capacity change from 0 to 264192 [ 1139.517913][ T1440] loop0: p1 < > p2 p3 p4 [ 1139.522283][ T1440] loop0: partition table partially beyond EOD, truncated [ 1139.529535][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1139.535612][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated 06:42:16 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0a01006e6574656d0000005c0002"], 0x8c}}, 0x0) 06:42:16 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000000000630008000000000000000b4000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1139.543177][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1139.551933][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1139.554780][T30032] __nla_validate_parse: 48 callbacks suppressed [ 1139.554793][T30032] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1139.568042][T30034] loop4: detected capacity change from 0 to 264192 06:42:16 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0008006e6574656d0000005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:16 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff07000000000000630008000000f6ffffff004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1139.630703][ T1440] loop4: p1 < > p2 p3 p4 [ 1139.636863][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1139.644712][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1139.654530][T30034] loop4: p1 < > p2 p3 p4 [ 1139.659266][T30034] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1139.666928][T30034] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1139.672982][T30045] loop5: detected capacity change from 0 to 264192 [ 1139.689524][ T1440] loop0: p1 < > p2 p3 p4 [ 1139.693992][ T1440] loop0: partition table partially beyond EOD, truncated [ 1139.701120][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1139.707164][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1139.714626][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1139.722187][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1139.731759][T30043] loop4: detected capacity change from 0 to 264192 06:42:16 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004068ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1139.747438][ T1440] loop0: p1 < > p2 p3 p4 [ 1139.751799][ T1440] loop0: partition table partially beyond EOD, truncated [ 1139.758977][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1139.764980][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1139.772504][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1139.780300][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1139.788850][T30043] loop4: p1 < > p2 p3 p4 [ 1139.794120][T30043] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1139.802637][T30043] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1139.825263][T30050] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1139.830924][T30051] loop1: detected capacity change from 0 to 264192 06:42:17 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff07007a0000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:42:17 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0b01006e6574656d0000005c0002"], 0x8c}}, 0x0) 06:42:17 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff07000000000000630008000000feffffff004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:17 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000000000630008000000000000000c4000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:17 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a000a006e6574656d0000005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1139.842075][T30052] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1139.854943][ T1440] loop4: p1 < > p2 p3 p4 [ 1139.860222][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1139.870258][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1139.928168][ T1440] loop0: p1 < > p2 p3 p4 [ 1139.932521][ T1440] loop0: partition table partially beyond EOD, truncated [ 1139.939715][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1139.945780][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1139.953486][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1139.961117][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1139.973864][ T1440] loop4: p1 < > p2 p3 p4 [ 1139.978743][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1139.986262][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1139.998834][T30060] loop5: detected capacity change from 0 to 264192 [ 1140.034038][ T1440] loop0: p1 < > p2 p3 p4 [ 1140.038482][ T1440] loop0: partition table partially beyond EOD, truncated [ 1140.045712][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1140.051704][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1140.059654][T30065] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1140.062710][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1140.077710][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:17 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0c01006e6574656d0000005c0002"], 0x8c}}, 0x0) [ 1140.084416][T30068] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1140.100923][T30069] loop1: detected capacity change from 0 to 264192 06:42:17 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff070000000000006300080000000000000000406cffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:17 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000020000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:17 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a000f006e6574656d0000005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1140.127830][ T1440] loop0: p1 < > p2 p3 p4 [ 1140.132283][ T1440] loop0: partition table partially beyond EOD, truncated [ 1140.139377][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1140.145387][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1140.153346][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1140.162114][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:17 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000000000630008000000000000000d4000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1140.184531][ T1440] loop0: p1 < > p2 p3 p4 [ 1140.188917][ T1440] loop0: partition table partially beyond EOD, truncated [ 1140.189894][T30074] loop4: detected capacity change from 0 to 264192 [ 1140.196002][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1140.208526][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1140.217054][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1140.225537][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1140.243819][ T1440] loop0: p1 < > p2 p3 p4 [ 1140.245858][T30074] loop4: p1 < > p2 p3 p4 [ 1140.248242][ T1440] loop0: partition table partially beyond EOD, truncated [ 1140.248324][ T1440] loop0: p1 start 1 is beyond EOD, [ 1140.253850][T30074] loop4: p2 size 1073741824 extends beyond EOD, [ 1140.259613][ T1440] truncated [ 1140.259619][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1140.260752][ T1440] loop0: p3 size 1912633224 extends beyond EOD, [ 1140.264836][T30074] truncated [ 1140.266148][T30074] loop4: p3 size 1912633224 extends beyond EOD, [ 1140.271217][ T1440] truncated [ 1140.274313][T30074] truncated [ 1140.304023][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1140.323062][T30075] loop4: detected capacity change from 0 to 264192 [ 1140.337359][ T1440] loop0: p1 < > p2 p3 p4 [ 1140.341936][ T1440] loop0: partition table partially beyond EOD, truncated [ 1140.349063][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1140.355056][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1140.355664][T30080] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1140.363404][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1140.375911][T30075] loop4: p1 < > p2 p3 p4 [ 1140.380941][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:17 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0d01006e6574656d0000005c0002"], 0x8c}}, 0x0) 06:42:17 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000030000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1140.387699][T30075] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1140.390383][T30081] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1140.398504][T30075] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1140.426154][T30084] loop5: detected capacity change from 0 to 264192 06:42:17 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700900000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:42:17 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0010006e6574656d0000005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:17 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004074ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1140.463642][ T1440] loop4: p1 < > p2 p3 p4 [ 1140.469628][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1140.477944][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1140.483770][T30089] loop1: detected capacity change from 0 to 264192 [ 1140.511700][ T1440] loop0: p1 < > p2 p3 p4 [ 1140.516113][ T1440] loop0: partition table partially beyond EOD, truncated [ 1140.523185][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1140.529193][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1140.537010][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1140.544470][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:17 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000000000630008000000000000000e4000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1140.564080][ T1440] loop0: p1 < > p2 p3 p4 [ 1140.568467][ T1440] loop0: partition table partially beyond EOD, truncated [ 1140.575652][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1140.581693][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1140.589537][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1140.597697][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:17 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000040000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1140.660703][ T1440] loop0: p1 < > p2 p3 p4 [ 1140.665095][ T1440] loop0: partition table partially beyond EOD, truncated [ 1140.672323][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1140.678525][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1140.689554][T30098] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1140.696565][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:42:17 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0025006e6574656d0000005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:17 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0e01006e6574656d0000005c0002"], 0x8c}}, 0x0) [ 1140.707312][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1140.708684][T30101] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1140.726685][ T1440] loop0: p1 < > p2 p3 p4 [ 1140.731057][ T1440] loop0: partition table partially beyond EOD, truncated [ 1140.738193][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1140.744174][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1140.751871][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1140.759571][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1140.775544][T30102] loop5: detected capacity change from 0 to 264192 [ 1140.788964][T30103] loop4: detected capacity change from 0 to 264192 06:42:18 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff070000000000006300080000000000000000407affffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1140.827868][T30103] loop4: p1 < > p2 p3 p4 [ 1140.832866][T30103] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1140.841710][T30103] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1140.867141][ T1440] loop0: p1 < > p2 p3 p4 [ 1140.869315][T30107] loop1: detected capacity change from 0 to 264192 [ 1140.871499][ T1440] loop0: partition table partially beyond EOD, truncated [ 1140.885157][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1140.891153][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1140.898662][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1140.909200][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:18 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000050000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1140.926124][T30105] loop4: detected capacity change from 0 to 264192 [ 1140.935799][ T1440] loop0: p1 < > p2 p3 p4 [ 1140.940201][ T1440] loop0: partition table partially beyond EOD, truncated [ 1140.947323][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1140.947831][T30111] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1140.953294][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1140.953664][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:42:18 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000000000630008000000000000000f4000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:18 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0f01006e6574656d0000005c0002"], 0x8c}}, 0x0) 06:42:18 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001000a6574656d0000005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1140.978408][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1140.987836][T30105] loop4: p1 < > p2 p3 p4 [ 1140.993698][T30105] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1141.005027][T30105] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:42:18 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700920000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1141.036601][T30118] loop5: detected capacity change from 0 to 264192 [ 1141.057448][ T1440] loop4: p1 < > p2 p3 p4 [ 1141.062165][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1141.070148][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:42:18 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000000000630008000000000000000040feffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:18 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000060000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1141.115086][ T1440] loop0: p1 < > p2 p3 p4 [ 1141.119443][ T1440] loop0: partition table partially beyond EOD, truncated [ 1141.126554][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1141.132529][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1141.141800][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1141.150379][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:18 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a1001006e6574656d0000005c0002"], 0x8c}}, 0x0) 06:42:18 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a000100256574656d0000005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1141.167494][ T1440] loop4: p1 < > p2 p3 p4 [ 1141.169953][T30124] loop1: detected capacity change from 0 to 264192 [ 1141.172366][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1141.186060][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:42:18 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000114000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1141.245435][ T1440] loop0: p1 < > p2 p3 p4 [ 1141.249780][ T1440] loop0: partition table partially beyond EOD, truncated [ 1141.256894][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1141.262871][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1141.269737][T30136] loop5: detected capacity change from 0 to 264192 [ 1141.271643][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1141.283966][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:18 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000080000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:18 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa502000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:18 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a1101006e6574656d0000005c0002"], 0x8c}}, 0x0) [ 1141.316780][T30139] loop4: detected capacity change from 0 to 264192 [ 1141.355352][T30139] loop4: p1 < > p2 p3 p4 [ 1141.360397][T30139] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1141.369313][T30139] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1141.381572][ T1440] loop0: p1 < > p2 p3 p4 [ 1141.385926][ T1440] loop0: partition table partially beyond EOD, truncated [ 1141.393069][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1141.399176][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1141.406720][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1141.414277][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:18 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001026e6574656d0000005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1141.447274][T30145] loop4: detected capacity change from 0 to 264192 [ 1141.455139][ T1440] loop0: p1 < > p2 p3 p4 [ 1141.459475][ T1440] loop0: partition table partially beyond EOD, truncated [ 1141.463496][T30154] loop1: detected capacity change from 0 to 264192 [ 1141.466584][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1141.479036][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1141.487351][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:42:18 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000124000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:18 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a1201006e6574656d0000005c0002"], 0x8c}}, 0x0) [ 1141.494768][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1141.506484][T30145] loop4: p1 < > p2 p3 p4 [ 1141.511409][T30145] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1141.519062][T30145] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1141.522134][T30155] loop5: detected capacity change from 0 to 264192 06:42:18 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700fe0000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:42:18 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff07000000000000630008000000000a0000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:18 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001036e6574656d0000005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1141.576813][ T1440] loop4: p1 < > p2 p3 p4 [ 1141.582421][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1141.591676][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:42:18 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa503000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1141.637953][ T1440] loop0: p1 < > p2 p3 p4 [ 1141.642333][ T1440] loop0: partition table partially beyond EOD, truncated [ 1141.649442][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1141.655433][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1141.663183][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1141.670718][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1141.687642][ T1440] loop0: p1 < > p2 p3 p4 [ 1141.692015][ T1440] loop0: partition table partially beyond EOD, truncated [ 1141.699128][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1141.705281][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1141.713127][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1141.721303][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1141.737463][ T1440] loop4: p1 < > p2 p3 p4 [ 1141.742315][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1141.749826][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:42:18 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a2501006e6574656d0000005c0002"], 0x8c}}, 0x0) [ 1141.809214][T30169] loop1: detected capacity change from 0 to 264192 [ 1141.844898][ T1440] loop0: p1 < > p2 p3 p4 [ 1141.849287][ T1440] loop0: partition table partially beyond EOD, truncated 06:42:18 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff07000000000000630008000000000b0000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1141.856376][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1141.862378][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1141.864242][T30174] loop5: detected capacity change from 0 to 264192 [ 1141.872891][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1141.883442][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:19 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000204000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:19 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001046e6574656d0000005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1141.907475][T30178] loop4: detected capacity change from 0 to 264192 06:42:19 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa504000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1141.936773][T30178] loop4: p1 < > p2 p3 p4 [ 1141.943128][T30178] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1141.952355][T30178] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1141.961600][ T1440] loop0: p1 < > p2 p3 p4 [ 1141.965955][ T1440] loop0: partition table partially beyond EOD, truncated [ 1141.973071][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1141.979203][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated 06:42:19 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a4801006e6574656d0000005c0002"], 0x8c}}, 0x0) [ 1141.986736][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1141.994216][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1142.008246][T30182] loop4: detected capacity change from 0 to 264192 [ 1142.020762][ T1440] loop0: p1 < > p2 p3 p4 [ 1142.025179][ T1440] loop0: partition table partially beyond EOD, truncated [ 1142.032225][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1142.038202][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1142.046197][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1142.053767][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1142.061909][T30182] loop4: p1 < > p2 p3 p4 [ 1142.067122][T30182] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1142.076517][T30182] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1142.085598][ T1440] loop0: p1 < > p2 p3 p4 [ 1142.089934][ T1440] loop0: partition table partially beyond EOD, truncated [ 1142.090244][T30188] loop1: detected capacity change from 0 to 264192 [ 1142.097036][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1142.109601][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1142.117074][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1142.124728][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:19 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700590100000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:42:19 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001056e6574656d0000005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:19 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000180000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:19 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000254000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:19 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a4c01006e6574656d0000005c0002"], 0x8c}}, 0x0) [ 1142.157614][ T1440] loop4: p1 < > p2 p3 p4 [ 1142.163216][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1142.173996][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1142.197159][T30196] loop5: detected capacity change from 0 to 264192 06:42:19 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa505000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:19 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001066e6574656d0000005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1142.298707][ T1440] loop0: p1 < > p2 p3 p4 [ 1142.303056][ T1440] loop0: partition table partially beyond EOD, truncated [ 1142.310239][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1142.316226][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1142.325471][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1142.333057][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1142.352084][ T1440] loop0: p1 < > p2 p3 p4 [ 1142.356445][ T1440] loop0: partition table partially beyond EOD, truncated [ 1142.363602][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1142.369615][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1142.377268][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1142.384985][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1142.404380][T30209] loop1: detected capacity change from 0 to 264192 [ 1142.406308][T30210] loop4: detected capacity change from 0 to 264192 [ 1142.412372][ T1440] loop0: p1 < > p2 p3 p4 [ 1142.421767][ T1440] loop0: partition table partially beyond EOD, truncated [ 1142.428882][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1142.434849][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1142.442576][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:42:19 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a5801006e6574656d0000005c0002"], 0x8c}}, 0x0) 06:42:19 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000260000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1142.451160][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1142.472490][ T1440] loop0: p1 < > p2 p3 p4 [ 1142.476867][ T1440] loop0: partition table partially beyond EOD, truncated [ 1142.483908][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1142.489879][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated 06:42:19 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000000000630008000000000000003f4000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:19 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff07005c0100000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1142.504112][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1142.508424][T30214] loop4: detected capacity change from 0 to 264192 [ 1142.517675][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1142.528686][T30215] loop5: detected capacity change from 0 to 264192 06:42:19 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa506000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:19 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001076e6574656d0000005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1142.591398][ T1440] loop0: p1 < > p2 p3 p4 [ 1142.595770][ T1440] loop0: partition table partially beyond EOD, truncated [ 1142.602826][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1142.608856][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1142.616906][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1142.624967][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:19 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a6001006e6574656d0000005c0002"], 0x8c}}, 0x0) 06:42:19 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000730000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1142.695105][T30227] loop1: detected capacity change from 0 to 264192 [ 1142.707904][ T1440] loop0: p1 < > p2 p3 p4 [ 1142.712245][ T1440] loop0: partition table partially beyond EOD, truncated [ 1142.719527][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1142.725699][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1142.733654][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:42:19 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000404000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1142.742035][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1142.788037][T30230] loop4: detected capacity change from 0 to 264192 [ 1142.817667][ T1440] loop0: p1 < > p2 p3 p4 [ 1142.821664][T30233] loop5: detected capacity change from 0 to 264192 [ 1142.822004][ T1440] loop0: partition table partially beyond EOD, truncated [ 1142.822128][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1142.841551][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1142.853702][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1142.862089][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:20 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000830000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:20 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001086e6574656d0000005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:20 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa507000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:20 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a6801006e6574656d0000005c0002"], 0x8c}}, 0x0) [ 1142.886589][T30234] loop4: detected capacity change from 0 to 264192 [ 1142.895695][ T1440] loop0: p1 < > p2 p3 p4 [ 1142.900121][ T1440] loop0: partition table partially beyond EOD, truncated [ 1142.907229][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1142.913277][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1142.921051][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1142.928802][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:20 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700980100000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1142.998314][T30244] loop1: detected capacity change from 0 to 264192 [ 1143.072277][ T1440] loop0: p1 < > p2 p3 p4 [ 1143.076730][ T1440] loop0: partition table partially beyond EOD, truncated [ 1143.083871][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1143.089871][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1143.097420][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1143.104977][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:20 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000fe0000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:20 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000484000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:20 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a6c01006e6574656d0000005c0002"], 0x8c}}, 0x0) [ 1143.137179][T30253] loop5: detected capacity change from 0 to 264192 [ 1143.155697][ T1440] loop0: p1 < > p2 p3 p4 [ 1143.160052][ T1440] loop0: partition table partially beyond EOD, truncated [ 1143.167136][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1143.173191][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated 06:42:20 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001096e6574656d0000005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1143.181783][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1143.192157][T30258] loop4: detected capacity change from 0 to 264192 [ 1143.198568][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:20 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa508000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1143.239257][T30259] loop4: detected capacity change from 0 to 264192 [ 1143.256549][ T1440] loop0: p1 < > p2 p3 p4 [ 1143.260936][ T1440] loop0: partition table partially beyond EOD, truncated [ 1143.268176][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1143.274144][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1143.282508][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:42:20 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000040200004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:20 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a7401006e6574656d0000005c0002"], 0x8c}}, 0x0) 06:42:20 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700a40100000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1143.291312][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1143.324108][T30264] loop1: detected capacity change from 0 to 264192 06:42:20 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000000000630008000000000000004c4000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:20 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a00010a6e6574656d0000005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1143.358163][ T1440] loop0: p1 < > p2 p3 p4 [ 1143.362492][ T1440] loop0: partition table partially beyond EOD, truncated [ 1143.369633][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1143.375647][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1143.384324][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1143.392983][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1143.435647][ T1440] loop0: p1 < > p2 p3 p4 [ 1143.439991][ T1440] loop0: partition table partially beyond EOD, truncated [ 1143.447230][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1143.449638][T30276] loop5: detected capacity change from 0 to 264192 [ 1143.453289][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1143.453738][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1143.474495][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:20 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a7a01006e6574656d0000005c0002"], 0x8c}}, 0x0) [ 1143.501905][ T1440] loop0: p1 < > p2 p3 p4 [ 1143.506379][ T1440] loop0: partition table partially beyond EOD, truncated [ 1143.513458][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1143.519428][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1143.530554][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1143.538418][T30283] loop4: detected capacity change from 0 to 264192 [ 1143.540900][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:20 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000300004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:20 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa509000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:20 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a00010b6e6574656d0000005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1143.560496][ T1440] loop0: p1 < > p2 p3 p4 [ 1143.564829][ T1440] loop0: partition table partially beyond EOD, truncated [ 1143.571985][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1143.578120][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1143.585036][T30285] loop1: detected capacity change from 0 to 264192 [ 1143.592614][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1143.600497][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:20 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000684000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1143.629303][T30286] loop4: detected capacity change from 0 to 264192 06:42:20 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0003006e6574656d0000005c0002"], 0x8c}}, 0x0) 06:42:20 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700cc0100000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:42:20 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000800300004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1143.736979][T30296] loop5: detected capacity change from 0 to 264192 06:42:20 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a00010c6e6574656d0000005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1143.780375][ T1440] loop0: p1 < > p2 p3 p4 [ 1143.784756][ T1440] loop0: partition table partially beyond EOD, truncated [ 1143.791993][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1143.798052][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1143.805729][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1143.813442][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:20 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa50a000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:21 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a000a006e6574656d0000005c0002"], 0x8c}}, 0x0) [ 1143.831412][ T1440] loop0: p1 < > p2 p3 p4 [ 1143.835894][ T1440] loop0: partition table partially beyond EOD, truncated [ 1143.842990][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1143.849005][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1143.849300][T30304] loop1: detected capacity change from 0 to 264192 [ 1143.858086][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1143.870511][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:21 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000000000630008000000000000006c4000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1143.910401][ T1440] loop0: p1 < > p2 p3 p4 [ 1143.914852][ T1440] loop0: partition table partially beyond EOD, truncated [ 1143.922112][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1143.928088][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1143.936226][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1143.943817][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1143.989488][ T1440] loop0: p1 < > p2 p3 p4 [ 1143.993848][ T1440] loop0: partition table partially beyond EOD, truncated [ 1144.000928][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1144.006946][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1144.008438][T30311] loop4: detected capacity change from 0 to 264192 [ 1144.016298][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1144.029072][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:21 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000020400004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:21 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a00010d6e6574656d0000005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1144.057846][T30317] loop5: detected capacity change from 0 to 264192 [ 1144.067776][ T1440] loop0: p1 < > p2 p3 p4 [ 1144.072125][ T1440] loop0: partition table partially beyond EOD, truncated [ 1144.079266][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1144.085301][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1144.093154][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1144.101525][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1144.102147][T30318] loop4: detected capacity change from 0 to 264192 06:42:21 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa50b000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:21 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a000f006e6574656d0000005c0002"], 0x8c}}, 0x0) 06:42:21 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700ec0100000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1144.197288][T30323] loop1: detected capacity change from 0 to 264192 06:42:21 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000060400004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:21 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000744000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1144.259783][ T1440] loop0: p1 < > p2 p3 p4 [ 1144.264229][ T1440] loop0: partition table partially beyond EOD, truncated [ 1144.271378][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1144.277432][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1144.288435][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1144.296813][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:21 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a00010e6e6574656d0000005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1144.316674][ T1440] loop0: p1 < > p2 p3 p4 [ 1144.321026][ T1440] loop0: partition table partially beyond EOD, truncated [ 1144.328305][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1144.334328][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1144.342717][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1144.350288][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:21 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0025006e6574656d0000005c0002"], 0x8c}}, 0x0) [ 1144.362561][T30334] loop5: detected capacity change from 0 to 264192 [ 1144.373022][T30337] loop4: detected capacity change from 0 to 264192 06:42:21 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa50c000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1144.421374][ T1440] loop0: p1 < > p2 p3 p4 [ 1144.425826][ T1440] loop0: partition table partially beyond EOD, truncated [ 1144.433004][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1144.439036][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1144.446879][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1144.455858][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1144.456905][T30340] loop4: detected capacity change from 0 to 264192 06:42:21 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000500004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:21 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700fa0100000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:42:21 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a00010f6e6574656d0000005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1144.498579][T30342] loop1: detected capacity change from 0 to 264192 [ 1144.563009][T30349] __nla_validate_parse: 27 callbacks suppressed [ 1144.563026][T30349] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1144.583327][T30350] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1144.585142][ T1440] loop0: p1 < > p2 p3 p4 [ 1144.596971][ T1440] loop0: partition table partially beyond EOD, truncated [ 1144.604256][ T1440] loop0: p1 start 1 is beyond EOD, truncated 06:42:21 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000000000630008000000000000007a4000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:21 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0064006e6574656d0000005c0002"], 0x8c}}, 0x0) [ 1144.610314][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1144.619644][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1144.627715][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:21 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa50d000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1144.666922][T30352] loop5: detected capacity change from 0 to 264192 06:42:21 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000600004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:21 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001106e6574656d0000005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1144.767446][ T1440] loop0: p1 < > p2 p3 p4 [ 1144.771844][ T1440] loop0: partition table partially beyond EOD, truncated [ 1144.779105][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1144.785110][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1144.792637][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1144.797126][T30364] loop1: detected capacity change from 0 to 264192 [ 1144.803245][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1144.807636][T30365] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1144.826934][T30366] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1144.827812][ T1440] loop0: p1 < > p2 p3 p4 [ 1144.840803][ T1440] loop0: partition table partially beyond EOD, truncated [ 1144.847911][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1144.853883][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1144.859625][T30367] loop4: detected capacity change from 0 to 264192 06:42:22 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0002006e6574656d0000005c0002"], 0x8c}}, 0x0) [ 1144.861443][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1144.875033][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:22 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000814000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:22 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000040600004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1144.915927][T30371] loop5: detected capacity change from 0 to 264192 06:42:22 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa50e000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1144.962509][T30370] loop4: detected capacity change from 0 to 264192 [ 1144.970819][ T1440] loop0: p1 < > p2 p3 p4 [ 1144.975227][ T1440] loop0: partition table partially beyond EOD, truncated [ 1144.982355][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1144.988335][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1144.995984][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:42:22 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001116e6574656d0000005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1145.007341][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1145.023247][ T1440] loop0: p1 < > p2 p3 p4 [ 1145.027669][ T1440] loop0: partition table partially beyond EOD, truncated [ 1145.034783][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1145.040882][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1145.048512][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:42:22 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700040200000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1145.057431][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:22 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0003006e6574656d0000005c0002"], 0x8c}}, 0x0) [ 1145.116423][T30380] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1145.128737][T30382] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1145.152452][T30383] loop1: detected capacity change from 0 to 264192 [ 1145.167698][ T1440] loop0: p1 < > p2 p3 p4 [ 1145.172033][ T1440] loop0: partition table partially beyond EOD, truncated [ 1145.179111][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1145.185093][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1145.192886][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1145.200473][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:22 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000904000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:22 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000a00004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:22 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001126e6574656d0000005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1145.225605][T30389] loop5: detected capacity change from 0 to 264192 [ 1145.246778][T30393] loop4: detected capacity change from 0 to 264192 06:42:22 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0008006e6574656d0000005c0002"], 0x8c}}, 0x0) [ 1145.269836][T30396] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. 06:42:22 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff07001f0200000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:42:22 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa50f000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1145.343023][T30401] loop1: detected capacity change from 0 to 264192 [ 1145.359823][ T1440] loop0: p1 < > p2 p3 p4 [ 1145.364163][ T1440] loop0: partition table partially beyond EOD, truncated [ 1145.371286][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1145.377275][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1145.386974][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1145.394592][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1145.407868][ T1440] loop0: p1 < > p2 p3 p4 [ 1145.412190][ T1440] loop0: partition table partially beyond EOD, truncated [ 1145.419268][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1145.425333][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1145.434147][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:42:22 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000000000630008000000000000059f4000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:22 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000b00004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1145.441735][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1145.461395][T30410] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1145.470812][T30410] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1145.489007][ T1440] loop0: p1 < > p2 p3 p4 06:42:22 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001256e6574656d0000005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1145.493371][ T1440] loop0: partition table partially beyond EOD, truncated [ 1145.500533][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1145.506533][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1145.514114][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1145.514355][T30413] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1145.521880][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:22 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a000a006e6574656d0000005c0002"], 0x8c}}, 0x0) [ 1145.554152][ T1440] loop0: p1 < > p2 p3 p4 [ 1145.558522][ T1440] loop0: partition table partially beyond EOD, truncated [ 1145.565607][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1145.571610][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1145.579736][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1145.587271][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1145.599329][T30414] loop4: detected capacity change from 0 to 264192 [ 1145.620719][T30415] loop5: detected capacity change from 0 to 264192 [ 1145.652759][ T1440] loop0: p1 < > p2 p3 p4 [ 1145.657154][ T1440] loop0: partition table partially beyond EOD, truncated [ 1145.664217][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1145.670201][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1145.680877][T30419] loop1: detected capacity change from 0 to 264192 [ 1145.683712][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1145.695597][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:22 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa510000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1145.711372][T30417] loop4: detected capacity change from 0 to 264192 [ 1145.722979][ T1440] loop0: p1 < > p2 p3 p4 [ 1145.727342][ T1440] loop0: partition table partially beyond EOD, truncated [ 1145.734510][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1145.740641][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1145.748319][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:42:22 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000001800004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:22 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000005c54000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1145.755974][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1145.775326][ T1440] loop0: p1 < > p2 p3 p4 [ 1145.779745][ T1440] loop0: partition table partially beyond EOD, truncated [ 1145.786993][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1145.792964][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1145.800991][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:42:22 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a00012c6e6574656d0000005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:22 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700200200000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1145.809128][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:23 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a000f006e6574656d0000005c0002"], 0x8c}}, 0x0) [ 1145.933710][ T1440] loop0: p1 < > p2 p3 p4 [ 1145.938135][ T1440] loop0: partition table partially beyond EOD, truncated [ 1145.945254][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1145.951232][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1145.958889][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1145.972367][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1145.991439][T30435] loop5: detected capacity change from 0 to 264192 [ 1145.992094][T30437] loop1: detected capacity change from 0 to 264192 [ 1146.008677][ T1440] loop0: p1 < > p2 p3 p4 [ 1146.013014][ T1440] loop0: partition table partially beyond EOD, truncated [ 1146.020202][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1146.026184][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1146.033925][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:42:23 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0025006e6574656d0000005c0002"], 0x8c}}, 0x0) 06:42:23 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000002000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1146.034337][T30439] loop4: detected capacity change from 0 to 264192 [ 1146.041973][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1146.066032][ T1440] loop0: p1 < > p2 p3 p4 [ 1146.070460][ T1440] loop0: partition table partially beyond EOD, truncated [ 1146.077584][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1146.083572][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated 06:42:23 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000000000630008000000000000fffe4000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:23 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa511000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:23 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001486e6574656d0000005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1146.091758][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1146.106571][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1146.131052][T30444] loop4: detected capacity change from 0 to 264192 06:42:23 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff07004c0200000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:42:23 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0064006e6574656d0000005c0002"], 0x8c}}, 0x0) [ 1146.194364][ T1440] loop0: p1 < > p2 p3 p4 [ 1146.198747][ T1440] loop0: partition table partially beyond EOD, truncated [ 1146.205814][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1146.211790][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1146.219866][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1146.230443][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1146.261814][ T1440] loop0: p1 < > p2 p3 p4 [ 1146.266212][ T1440] loop0: partition table partially beyond EOD, truncated [ 1146.274036][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1146.280142][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1146.281720][T30456] loop1: detected capacity change from 0 to 264192 [ 1146.290466][T30457] loop5: detected capacity change from 0 to 264192 [ 1146.296020][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:42:23 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000002600004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1146.308661][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1146.330082][ T1440] loop0: p1 < > p2 p3 p4 [ 1146.334431][ T1440] loop0: partition table partially beyond EOD, truncated [ 1146.341621][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1146.347660][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1146.355125][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:42:23 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a00014c6e6574656d0000005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:23 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff070000000000006300080000000000000fff4000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1146.362723][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:23 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa512000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1146.466685][ T1440] loop0: p1 < > p2 p3 p4 [ 1146.471116][ T1440] loop0: partition table partially beyond EOD, truncated [ 1146.478230][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1146.484279][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1146.493286][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1146.497802][T30465] loop4: detected capacity change from 0 to 264192 [ 1146.504198][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:23 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001000a6574656d0000005c0002"], 0x8c}}, 0x0) [ 1146.530004][ T1440] loop0: p1 < > p2 p3 p4 [ 1146.534412][ T1440] loop0: partition table partially beyond EOD, truncated [ 1146.541475][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1146.547521][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1146.555427][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1146.562921][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:23 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000003f00004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1146.578303][ T1440] loop0: p1 < > p2 p3 p4 [ 1146.582667][ T1440] loop0: partition table partially beyond EOD, truncated [ 1146.589952][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1146.596043][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1146.604832][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1146.612962][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1146.625026][T30469] loop4: detected capacity change from 0 to 264192 06:42:23 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001586e6574656d0000005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:23 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700500200000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:42:23 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a000100256574656d0000005c0002"], 0x8c}}, 0x0) [ 1146.690022][T30475] loop1: detected capacity change from 0 to 264192 [ 1146.711473][T30478] loop5: detected capacity change from 0 to 264192 06:42:23 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000000000630008000000000000feff4000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:23 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa525000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1146.772592][ T1440] loop0: p1 < > p2 p3 p4 [ 1146.776982][ T1440] loop0: partition table partially beyond EOD, truncated [ 1146.784136][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1146.790169][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1146.797859][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1146.805491][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:23 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000004000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1146.829931][ T1440] loop0: p1 < > p2 p3 p4 [ 1146.834275][ T1440] loop0: partition table partially beyond EOD, truncated [ 1146.841671][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1146.847658][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1146.855407][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1146.862941][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:24 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001606e6574656d0000005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1146.933165][T30493] loop4: detected capacity change from 0 to 264192 [ 1146.941381][ T1440] loop0: p1 < > p2 p3 p4 [ 1146.945779][ T1440] loop0: partition table partially beyond EOD, truncated [ 1146.952820][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1146.958820][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1146.966787][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1146.974370][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:24 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001026e6574656d0000005c0002"], 0x8c}}, 0x0) [ 1146.987233][T30497] loop1: detected capacity change from 0 to 264192 [ 1147.009862][T30500] loop5: detected capacity change from 0 to 264192 [ 1147.020168][T30498] loop4: detected capacity change from 0 to 264192 [ 1147.020201][ T1440] loop0: p1 < > p2 p3 p4 06:42:24 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000000da2ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:24 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000007300004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1147.031068][ T1440] loop0: partition table partially beyond EOD, truncated [ 1147.038181][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1147.044187][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1147.051843][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1147.060465][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:24 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa548000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:24 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700600200000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1147.113819][ T1440] loop0: p1 < > p2 p3 p4 [ 1147.118260][ T1440] loop0: partition table partially beyond EOD, truncated [ 1147.125368][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1147.131463][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1147.139298][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1147.148254][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:24 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001686e6574656d0000005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1147.248088][ T1440] loop0: p1 < > p2 p3 p4 [ 1147.252460][ T1440] loop0: partition table partially beyond EOD, truncated [ 1147.259700][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1147.265721][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1147.274959][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1147.283598][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:24 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001036e6574656d0000005c0002"], 0x8c}}, 0x0) 06:42:24 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000038000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1147.303368][T30514] loop1: detected capacity change from 0 to 264192 [ 1147.317329][T30515] loop5: detected capacity change from 0 to 264192 [ 1147.326601][T30516] loop4: detected capacity change from 0 to 264192 [ 1147.335815][ T1440] loop0: p1 < > p2 p3 p4 [ 1147.340233][ T1440] loop0: partition table partially beyond EOD, truncated [ 1147.347389][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1147.353371][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1147.360887][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1147.368382][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:24 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa54c000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:24 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000a20d00ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1147.433953][T30517] loop4: detected capacity change from 0 to 264192 [ 1147.450315][ T1440] loop0: p1 < > p2 p3 p4 [ 1147.454671][ T1440] loop0: partition table partially beyond EOD, truncated [ 1147.461975][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1147.467998][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1147.476021][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:42:24 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a00016c6e6574656d0000005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:24 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001046e6574656d0000005c0002"], 0x8c}}, 0x0) 06:42:24 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000008300004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:24 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff07007c0200000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1147.484321][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1147.557935][ T1440] loop0: p1 < > p2 p3 p4 [ 1147.562268][ T1440] loop0: partition table partially beyond EOD, truncated [ 1147.569370][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1147.575364][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1147.582792][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1147.590354][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1147.612043][T30531] loop1: detected capacity change from 0 to 264192 [ 1147.621097][T30532] loop5: detected capacity change from 0 to 264192 [ 1147.632387][ T1440] loop0: p1 < > p2 p3 p4 [ 1147.636750][ T1440] loop0: partition table partially beyond EOD, truncated [ 1147.643802][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1147.649789][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated 06:42:24 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001746e6574656d0000005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1147.657625][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1147.671088][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:24 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000fdef00004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:24 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001056e6574656d0000005c0002"], 0x8c}}, 0x0) 06:42:24 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000002500ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:24 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa568000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1147.703669][T30543] loop4: detected capacity change from 0 to 264192 [ 1147.727217][ T1440] loop0: p1 < > p2 p3 p4 [ 1147.731682][ T1440] loop0: partition table partially beyond EOD, truncated [ 1147.738776][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1147.744846][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1147.752357][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1147.760114][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:25 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a00017a6e6574656d0000005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1147.810406][T30544] loop4: detected capacity change from 0 to 264192 06:42:25 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700000300000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1147.884193][ T1440] loop0: p1 < > p2 p3 p4 [ 1147.888565][ T1440] loop0: partition table partially beyond EOD, truncated [ 1147.895737][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1147.901714][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1147.909296][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1147.919394][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1147.938835][T30556] loop5: detected capacity change from 0 to 264192 [ 1147.945917][T30554] loop1: detected capacity change from 0 to 264192 [ 1147.953629][ T1440] loop0: p1 < > p2 p3 p4 [ 1147.957984][ T1440] loop0: partition table partially beyond EOD, truncated [ 1147.965092][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1147.971052][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1147.978584][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:42:25 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001066e6574656d0000005c0002"], 0x8c}}, 0x0) 06:42:25 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000effd00004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1147.986374][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1148.005861][ T1440] loop0: p1 < > p2 p3 p4 [ 1148.010233][ T1440] loop0: partition table partially beyond EOD, truncated [ 1148.017454][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1148.023430][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1148.031274][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:42:25 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa56c000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:25 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000024000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1148.041144][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:25 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001000a6574656d0000005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1148.093268][T30564] loop4: detected capacity change from 0 to 264192 [ 1148.114242][ T1440] loop0: p1 < > p2 p3 p4 [ 1148.118662][ T1440] loop0: partition table partially beyond EOD, truncated [ 1148.125751][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1148.131760][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated 06:42:25 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001076e6574656d0000005c0002"], 0x8c}}, 0x0) [ 1148.139561][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1148.149583][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1148.172292][ T1440] loop0: p1 < > p2 p3 p4 [ 1148.176740][ T1440] loop0: partition table partially beyond EOD, truncated [ 1148.183768][ T1440] loop0: p1 start 1 is beyond EOD, truncated 06:42:25 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000fffe00004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1148.189825][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1148.199579][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1148.207202][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1148.220764][T30571] loop4: detected capacity change from 0 to 264192 [ 1148.235870][ T1440] loop0: p1 < > p2 p3 p4 [ 1148.240292][ T1440] loop0: partition table partially beyond EOD, truncated [ 1148.247466][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1148.253442][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1148.258359][T30576] loop1: detected capacity change from 0 to 264192 [ 1148.264341][T30577] loop5: detected capacity change from 0 to 264192 [ 1148.270421][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1148.281265][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:25 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff07001d0300000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:42:25 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000034000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:25 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa574000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:25 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a000100256574656d0000005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:25 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001086e6574656d0000005c0002"], 0x8c}}, 0x0) [ 1148.422624][ T1440] loop0: p1 < > p2 p3 p4 [ 1148.426992][ T1440] loop0: partition table partially beyond EOD, truncated [ 1148.434120][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1148.440236][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1148.447664][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1148.455208][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:25 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000feff00004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1148.469311][ T1440] loop0: p1 < > p2 p3 p4 [ 1148.473647][ T1440] loop0: partition table partially beyond EOD, truncated [ 1148.480714][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1148.486692][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1148.495089][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1148.502629][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1148.528528][ T1440] loop0: p1 < > p2 p3 p4 [ 1148.532885][ T1440] loop0: partition table partially beyond EOD, truncated [ 1148.539974][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1148.546007][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1148.553580][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1148.561123][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1148.571093][T30594] loop5: detected capacity change from 0 to 264192 06:42:25 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001096e6574656d0000005c0002"], 0x8c}}, 0x0) 06:42:25 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa57a000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1148.584625][T30595] loop1: detected capacity change from 0 to 264192 [ 1148.584765][T30596] loop4: detected capacity change from 0 to 264192 06:42:25 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e0a74656d0000005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:25 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000008004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:25 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000044000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1148.682465][T30606] loop4: detected capacity change from 0 to 264192 [ 1148.691321][ T1440] loop0: p1 < > p2 p3 p4 [ 1148.695782][ T1440] loop0: partition table partially beyond EOD, truncated [ 1148.702819][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1148.708816][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1148.717246][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1148.724776][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1148.740274][ T1440] loop0: p1 < > p2 p3 p4 [ 1148.744708][ T1440] loop0: partition table partially beyond EOD, truncated [ 1148.751820][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1148.757812][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1148.765305][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1148.772721][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:25 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a00010a6e6574656d0000005c0002"], 0x8c}}, 0x0) 06:42:25 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff07002d0300000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1148.792214][T30612] loop5: detected capacity change from 0 to 264192 [ 1148.816086][ T1440] loop0: p1 < > p2 p3 p4 [ 1148.820434][ T1440] loop0: partition table partially beyond EOD, truncated [ 1148.827505][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1148.833581][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1148.841296][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1148.848994][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1148.868485][T30620] loop1: detected capacity change from 0 to 264192 [ 1148.878890][ T1440] loop0: p1 < > p2 p3 p4 [ 1148.883269][ T1440] loop0: partition table partially beyond EOD, truncated 06:42:26 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e2574656d0000005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:26 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000400008004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1148.890571][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1148.896756][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1148.906753][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1148.915097][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:26 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa590000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:26 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000054000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1148.947397][ T1440] loop0: p1 < > p2 p3 p4 [ 1148.951863][ T1440] loop0: partition table partially beyond EOD, truncated [ 1148.958948][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1148.964939][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1148.973053][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1148.987110][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:26 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a00010b6e6574656d0000005c0002"], 0x8c}}, 0x0) [ 1149.043836][T30628] loop4: detected capacity change from 0 to 264192 [ 1149.109728][ T1440] loop0: p1 < > p2 p3 p4 [ 1149.114182][ T1440] loop0: partition table partially beyond EOD, truncated [ 1149.121459][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1149.127488][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1149.140596][T30638] loop5: detected capacity change from 0 to 264192 [ 1149.144036][T30639] loop1: detected capacity change from 0 to 264192 06:42:26 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e650a656d0000005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:26 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000020004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:26 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a00010c6e6574656d0000005c0002"], 0x8c}}, 0x0) [ 1149.154687][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1149.164746][T30630] loop4: detected capacity change from 0 to 264192 [ 1149.172846][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:26 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5fe000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:26 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700400300000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:42:26 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000064000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1149.214344][ T1440] loop0: p1 < > p2 p3 p4 [ 1149.218733][ T1440] loop0: partition table partially beyond EOD, truncated [ 1149.225863][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1149.231868][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1149.239661][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1149.247448][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1149.352748][ T1440] loop0: p1 < > p2 p3 p4 [ 1149.357121][ T1440] loop0: partition table partially beyond EOD, truncated [ 1149.364151][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1149.370195][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1149.378157][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1149.386614][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:26 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a00010d6e6574656d0000005c0002"], 0x8c}}, 0x0) 06:42:26 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000040004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1149.444806][ T1440] loop0: p1 < > p2 p3 p4 [ 1149.449316][ T1440] loop0: partition table partially beyond EOD, truncated [ 1149.456442][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1149.462443][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1149.470396][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1149.479151][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:26 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6525656d0000005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1149.504110][T30662] loop5: detected capacity change from 0 to 264192 [ 1149.511027][T30663] loop4: detected capacity change from 0 to 264192 [ 1149.513081][ T1440] loop0: p1 < > p2 p3 p4 [ 1149.521930][ T1440] loop0: partition table partially beyond EOD, truncated [ 1149.529031][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1149.531503][T30664] loop1: detected capacity change from 0 to 264192 [ 1149.535019][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1149.535655][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1149.556494][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:26 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa504020000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1149.608773][T30665] loop4: detected capacity change from 0 to 264192 [ 1149.626471][T30667] __nla_validate_parse: 24 callbacks suppressed [ 1149.626486][T30667] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. 06:42:26 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000074000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1149.658622][ T1440] loop0: p1 < > p2 p3 p4 [ 1149.663049][ T1440] loop0: partition table partially beyond EOD, truncated [ 1149.670142][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1149.676141][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1149.684113][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:42:26 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a00010e6e6574656d0000005c0002"], 0x8c}}, 0x0) 06:42:26 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700680300000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:42:26 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e65740a6d0000005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:26 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff07000000000000630008000000007ffff0004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1149.705034][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1149.750549][ T1440] loop0: p1 < > p2 p3 p4 [ 1149.754977][ T1440] loop0: partition table partially beyond EOD, truncated [ 1149.762100][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1149.768182][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1149.770074][T30681] loop1: detected capacity change from 0 to 264192 [ 1149.778583][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1149.787053][T30680] loop5: detected capacity change from 0 to 264192 [ 1149.789552][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:26 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500030000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:27 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000084000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1149.868853][ T1440] loop0: p1 < > p2 p3 p4 [ 1149.871949][T30685] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1149.873202][ T1440] loop0: partition table partially beyond EOD, truncated [ 1149.873279][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1149.873293][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1149.903110][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:42:27 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a00010f6e6574656d0000005c0002"], 0x8c}}, 0x0) 06:42:27 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574256d0000005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:27 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000014000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1149.913539][T30690] loop4: detected capacity change from 0 to 264192 [ 1149.922423][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1149.995399][T30696] loop4: detected capacity change from 0 to 264192 [ 1150.003299][ T1440] loop0: p1 < > p2 p3 p4 [ 1150.007797][ T1440] loop0: partition table partially beyond EOD, truncated [ 1150.015058][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1150.021032][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1150.028670][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1150.033338][T30699] loop5: detected capacity change from 0 to 264192 [ 1150.037309][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1150.056065][ T1440] loop0: p1 < > p2 p3 p4 [ 1150.060413][ T1440] loop0: partition table partially beyond EOD, truncated [ 1150.061754][T30700] loop1: detected capacity change from 0 to 264192 [ 1150.067508][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1150.079971][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated 06:42:27 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff07006c0300000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:42:27 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa502040000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1150.091943][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1150.100253][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:27 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001106e6574656d0000005c0002"], 0x8c}}, 0x0) 06:42:27 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000094000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:27 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000024000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1150.139429][T30704] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1150.154529][T30705] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. 06:42:27 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d000000040002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1150.214946][ T1440] loop0: p1 < > p2 p3 p4 [ 1150.219305][ T1440] loop0: partition table partially beyond EOD, truncated [ 1150.226444][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1150.232548][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1150.240218][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1150.247944][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1150.265735][ T1440] loop0: p1 < > p2 p3 p4 [ 1150.270135][ T1440] loop0: partition table partially beyond EOD, truncated [ 1150.277238][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1150.283209][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1150.290872][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1150.299579][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1150.328354][T30715] loop4: detected capacity change from 0 to 264192 [ 1150.337867][T30716] loop5: detected capacity change from 0 to 264192 [ 1150.353586][ T1440] loop0: p1 < > p2 p3 p4 [ 1150.357973][ T1440] loop0: partition table partially beyond EOD, truncated [ 1150.365126][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1150.371099][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1150.378929][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1150.388430][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1150.408749][T30721] loop1: detected capacity change from 0 to 264192 [ 1150.418348][T30723] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. 06:42:27 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001116e6574656d0000005c0002"], 0x8c}}, 0x0) 06:42:27 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa506040000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1150.434047][ T1440] loop0: p1 < > p2 p3 p4 [ 1150.438496][ T1440] loop0: partition table partially beyond EOD, truncated [ 1150.445740][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1150.451735][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1150.459805][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1150.473267][T30720] loop4: detected capacity change from 0 to 264192 06:42:27 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000004024000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1150.479953][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1150.497792][ T1440] loop0: p1 < > p2 p3 p4 [ 1150.502859][ T1440] loop0: partition table partially beyond EOD, truncated [ 1150.509968][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1150.515170][T30726] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1150.515962][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated 06:42:27 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000000000630008000000000000000a4000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:27 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000001c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:27 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700700300000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1150.525273][T30726] netem: invalid attributes len -24 [ 1150.537648][T30726] netem: change failed [ 1150.538483][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1150.549270][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:27 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001126e6574656d0000005c0002"], 0x8c}}, 0x0) 06:42:27 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000034000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1150.624112][T30733] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1150.636534][T30735] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1150.649653][T30736] loop5: detected capacity change from 0 to 264192 06:42:27 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500050000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1150.718669][ T1440] loop0: p1 < > p2 p3 p4 [ 1150.723024][ T1440] loop0: partition table partially beyond EOD, truncated [ 1150.730199][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1150.736193][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1150.740412][T30740] loop1: detected capacity change from 0 to 264192 [ 1150.751784][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1150.751875][T30741] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1150.767072][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1150.784267][ T1440] loop0: p1 < > p2 p3 p4 [ 1150.784566][T30745] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1150.788823][ T1440] loop0: partition table partially beyond EOD, truncated [ 1150.805256][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1150.811396][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated 06:42:27 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000001f0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:28 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000000000630008000000000000000b4000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1150.822848][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1150.830918][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1150.861445][T30747] loop4: detected capacity change from 0 to 264192 06:42:28 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001256e6574656d0000005c0002"], 0x8c}}, 0x0) [ 1150.886241][ T1440] loop0: p1 < > p2 p3 p4 [ 1150.890592][ T1440] loop0: partition table partially beyond EOD, truncated [ 1150.897773][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1150.903884][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1150.912021][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1150.919600][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1150.933031][T30751] loop4: detected capacity change from 0 to 264192 [ 1150.964302][ T1440] loop0: p1 < > p2 p3 p4 [ 1150.968702][ T1440] loop0: partition table partially beyond EOD, truncated [ 1150.975911][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1150.981900][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1150.989826][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1150.997414][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:28 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700740300000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:42:28 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000044000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1151.019712][ T1440] loop0: p1 < > p2 p3 p4 [ 1151.024111][ T1440] loop0: partition table partially beyond EOD, truncated [ 1151.031391][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1151.037407][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1151.045259][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1151.052963][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1151.073416][T30755] loop5: detected capacity change from 0 to 264192 06:42:28 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa59f050000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1151.122195][T30760] loop1: detected capacity change from 0 to 264192 06:42:28 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001486e6574656d0000005c0002"], 0x8c}}, 0x0) 06:42:28 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0200005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:28 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000000000630008000000000000000c4000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:28 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000054000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1151.171363][ T1440] loop0: p1 < > p2 p3 p4 [ 1151.175752][ T1440] loop0: partition table partially beyond EOD, truncated [ 1151.182869][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1151.188883][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1151.196749][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1151.204240][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1151.213998][T30768] loop4: detected capacity change from 0 to 264192 06:42:28 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a00014c6e6574656d0000005c0002"], 0x8c}}, 0x0) [ 1151.270801][ T1440] loop0: p1 < > p2 p3 p4 [ 1151.275200][ T1440] loop0: partition table partially beyond EOD, truncated [ 1151.282228][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1151.288207][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1151.296994][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1151.299769][T30773] loop5: detected capacity change from 0 to 264192 [ 1151.305741][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:28 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0300005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1151.333219][ T1440] loop0: p1 < > p2 p3 p4 [ 1151.333658][T30772] loop4: detected capacity change from 0 to 264192 [ 1151.337595][ T1440] loop0: partition table partially beyond EOD, truncated [ 1151.351203][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1151.357258][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1151.364940][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1151.372586][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:28 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700800300000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:42:28 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5c5050000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1151.440330][T30784] loop1: detected capacity change from 0 to 264192 [ 1151.453034][ T1440] loop0: p1 < > p2 p3 p4 [ 1151.457433][ T1440] loop0: partition table partially beyond EOD, truncated [ 1151.464578][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1151.470608][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1151.478217][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:42:28 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000064000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1151.486204][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1151.503005][ T1440] loop0: p1 < > p2 p3 p4 [ 1151.507383][ T1440] loop0: partition table partially beyond EOD, truncated [ 1151.514688][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1151.520697][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1151.528258][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:42:28 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000000000630008000000000000000d4000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1151.535986][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:28 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001586e6574656d0000005c0002"], 0x8c}}, 0x0) [ 1151.614399][ T1440] loop0: p1 < > p2 p3 p4 [ 1151.618813][ T1440] loop0: partition table partially beyond EOD, truncated [ 1151.625888][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1151.631879][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1151.642133][T30796] loop5: detected capacity change from 0 to 264192 [ 1151.646633][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1151.656864][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:28 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0400005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1151.681068][T30802] loop4: detected capacity change from 0 to 264192 [ 1151.701710][T30804] loop1: detected capacity change from 0 to 264192 [ 1151.706514][ T1440] loop0: p1 < > p2 p3 p4 [ 1151.712806][ T1440] loop0: partition table partially beyond EOD, truncated [ 1151.719894][ T1440] loop0: p1 start 1 is beyond EOD, truncated 06:42:28 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001606e6574656d0000005c0002"], 0x8c}}, 0x0) 06:42:28 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500060000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:28 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000004064000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:28 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000000000630008000000000000000e4000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1151.725914][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1151.734095][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1151.742138][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:28 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700840300000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1151.786960][ T1440] loop0: p1 < > p2 p3 p4 [ 1151.789247][T30806] loop4: detected capacity change from 0 to 264192 [ 1151.791319][ T1440] loop0: partition table partially beyond EOD, truncated [ 1151.804979][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1151.810964][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1151.818609][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1151.826546][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:29 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0500005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:29 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000084000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:29 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001686e6574656d0000005c0002"], 0x8c}}, 0x0) [ 1151.892601][T30819] loop1: detected capacity change from 0 to 264192 [ 1151.921847][T30821] loop5: detected capacity change from 0 to 264192 06:42:29 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa504060000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:29 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000000000630008000000000000000f4000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1152.011877][ T1440] loop0: p1 < > p2 p3 p4 [ 1152.014360][T30828] loop4: detected capacity change from 0 to 264192 [ 1152.016262][ T1440] loop0: partition table partially beyond EOD, truncated [ 1152.029828][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1152.035850][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1152.043451][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1152.051005][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:29 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0600005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:29 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff07000000000000630008000000000000000a4000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1152.070216][ T1440] loop0: p1 < > p2 p3 p4 [ 1152.074575][ T1440] loop0: partition table partially beyond EOD, truncated [ 1152.081949][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1152.087942][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1152.096221][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1152.100825][T30834] loop4: detected capacity change from 0 to 264192 [ 1152.111748][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:29 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a00016c6e6574656d0000005c0002"], 0x8c}}, 0x0) 06:42:29 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700a20300000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1152.184873][T30841] loop5: detected capacity change from 0 to 264192 [ 1152.193794][T30842] loop1: detected capacity change from 0 to 264192 [ 1152.211788][ T1440] loop0: p1 < > p2 p3 p4 [ 1152.216247][ T1440] loop0: partition table partially beyond EOD, truncated [ 1152.223523][ T1440] loop0: p1 start 1 is beyond EOD, truncated 06:42:29 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500070000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1152.229532][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1152.237813][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1152.245327][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1152.270446][ T1440] loop0: p1 < > p2 p3 p4 [ 1152.274952][ T1440] loop0: partition table partially beyond EOD, truncated 06:42:29 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000104000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:29 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001746e6574656d0000005c0002"], 0x8c}}, 0x0) 06:42:29 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff07000000000000630008000000000000000b4000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1152.282143][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1152.288146][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1152.295858][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1152.321843][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:29 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0700005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1152.362672][ T1440] loop0: p1 < > p2 p3 p4 [ 1152.367059][ T1440] loop0: partition table partially beyond EOD, truncated [ 1152.374128][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1152.380223][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1152.387771][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1152.395629][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1152.405450][T30857] loop5: detected capacity change from 0 to 264192 [ 1152.405830][T30858] loop4: detected capacity change from 0 to 264192 06:42:29 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a00017a6e6574656d0000005c0002"], 0x8c}}, 0x0) 06:42:29 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500090000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1152.474987][T30864] loop1: detected capacity change from 0 to 264192 [ 1152.512640][T30860] loop4: detected capacity change from 0 to 264192 [ 1152.513624][ T1440] loop0: p1 < > p2 p3 p4 06:42:29 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000184000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:29 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000114000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:29 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0800005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1152.523629][ T1440] loop0: partition table partially beyond EOD, truncated [ 1152.530775][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1152.536780][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1152.544236][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1152.551783][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:29 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700ce0300000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1152.596496][ T1440] loop0: p1 < > p2 p3 p4 [ 1152.600845][ T1440] loop0: partition table partially beyond EOD, truncated [ 1152.607998][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1152.613981][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1152.621584][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1152.629517][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:29 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001000a6574656d0000005c0002"], 0x8c}}, 0x0) [ 1152.645941][T30876] loop5: detected capacity change from 0 to 264192 [ 1152.698982][ T1440] loop0: p1 < > p2 p3 p4 [ 1152.703448][ T1440] loop0: partition table partially beyond EOD, truncated [ 1152.710542][T30883] loop1: detected capacity change from 0 to 264192 [ 1152.710570][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1152.723247][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1152.731203][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:42:29 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5000a0000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1152.747583][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:29 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000264000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:29 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000124000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:29 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0900005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1152.778206][T30890] loop4: detected capacity change from 0 to 264192 [ 1152.794678][ T1440] loop0: p1 < > p2 p3 p4 [ 1152.799135][ T1440] loop0: partition table partially beyond EOD, truncated [ 1152.806304][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1152.812312][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1152.820307][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:42:30 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a000100256574656d0000005c0002"], 0x8c}}, 0x0) [ 1152.828122][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1152.850669][ T1440] loop0: p1 < > p2 p3 p4 [ 1152.855051][ T1440] loop0: partition table partially beyond EOD, truncated [ 1152.862104][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1152.868095][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1152.876123][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1152.879533][T30893] loop4: detected capacity change from 0 to 264192 [ 1152.883647][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1152.905710][ T1440] loop0: p1 < > p2 p3 p4 [ 1152.910060][ T1440] loop0: partition table partially beyond EOD, truncated [ 1152.917155][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1152.923187][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1152.930983][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1152.940548][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:30 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700d80300000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1152.979795][ T1440] loop0: p1 < > p2 p3 p4 [ 1152.984154][ T1440] loop0: partition table partially beyond EOD, truncated [ 1152.990694][T30900] loop5: detected capacity change from 0 to 264192 [ 1152.991254][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1153.003715][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1153.011433][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1153.021658][T30901] loop1: detected capacity change from 0 to 264192 06:42:30 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff07000000000000630008000000000000003f4000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:30 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e0a74656d0000005c0002"], 0x8c}}, 0x0) [ 1153.028446][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:30 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5000b0000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:30 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0a00005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:30 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000254000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1153.089038][ T1440] loop0: p1 < > p2 p3 p4 [ 1153.093382][ T1440] loop0: partition table partially beyond EOD, truncated [ 1153.100626][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1153.106659][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1153.113269][T30914] loop4: detected capacity change from 0 to 264192 [ 1153.115733][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1153.129336][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:30 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000404000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:30 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e2574656d0000005c0002"], 0x8c}}, 0x0) [ 1153.194621][T30917] loop4: detected capacity change from 0 to 264192 [ 1153.204894][ T1440] loop0: p1 < > p2 p3 p4 [ 1153.209251][ T1440] loop0: partition table partially beyond EOD, truncated [ 1153.216337][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1153.222338][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1153.229996][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1153.237555][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:30 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0b00005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:30 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700f00300000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1153.261398][T30926] loop5: detected capacity change from 0 to 264192 [ 1153.274094][T30928] loop1: detected capacity change from 0 to 264192 06:42:30 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e650a656d0000005c0002"], 0x8c}}, 0x0) 06:42:30 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5000c0000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:30 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000484000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:30 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000800404000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1153.346851][ T1440] loop0: p1 < > p2 p3 p4 [ 1153.351210][ T1440] loop0: partition table partially beyond EOD, truncated [ 1153.358351][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1153.364383][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1153.372920][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1153.382405][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:30 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0c00005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1153.468734][ T1440] loop0: p1 < > p2 p3 p4 [ 1153.473153][ T1440] loop0: partition table partially beyond EOD, truncated [ 1153.480301][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1153.481350][T30948] loop5: detected capacity change from 0 to 264192 [ 1153.486290][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1153.487584][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1153.509406][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:30 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6525656d0000005c0002"], 0x8c}}, 0x0) [ 1153.519452][T30951] loop1: detected capacity change from 0 to 264192 [ 1153.539974][T30953] loop4: detected capacity change from 0 to 264192 [ 1153.549558][ T1440] loop0: p1 < > p2 p3 p4 [ 1153.553900][ T1440] loop0: partition table partially beyond EOD, truncated [ 1153.561024][ T1440] loop0: p1 start 1 is beyond EOD, truncated 06:42:30 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000734000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1153.567097][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1153.574614][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1153.582143][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:30 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5000d0000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:30 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e65740a6d0000005c0002"], 0x8c}}, 0x0) 06:42:30 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000000000630008000000000000004c4000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:30 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0d00005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1153.633192][ T1440] loop0: p1 < > p2 p3 p4 [ 1153.637662][ T1440] loop0: partition table partially beyond EOD, truncated [ 1153.644719][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1153.650762][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1153.659430][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1153.667314][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1153.668722][T30958] loop4: detected capacity change from 0 to 264192 06:42:30 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700fa0300000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1153.774792][ T1440] loop0: p1 < > p2 p3 p4 [ 1153.779189][ T1440] loop0: partition table partially beyond EOD, truncated [ 1153.786596][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1153.792589][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1153.797129][T30972] loop5: detected capacity change from 0 to 264192 [ 1153.800995][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1153.816809][T30974] loop1: detected capacity change from 0 to 264192 06:42:30 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff070000000000006300080000000000f0ff7f4000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:30 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574256d0000005c0002"], 0x8c}}, 0x0) 06:42:31 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0e00005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1153.824266][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:31 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000684000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:31 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5000e0000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1153.885869][ T1440] loop0: p1 < > p2 p3 p4 [ 1153.890221][ T1440] loop0: partition table partially beyond EOD, truncated [ 1153.897303][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1153.903292][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1153.910921][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1153.914706][T30983] loop4: detected capacity change from 0 to 264192 [ 1153.918426][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:31 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d000000040002"], 0x8c}}, 0x0) [ 1153.940614][ T1440] loop0: p1 < > p2 p3 p4 [ 1153.944982][ T1440] loop0: partition table partially beyond EOD, truncated [ 1153.952140][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1153.958133][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1153.966315][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1153.973916][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:31 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000003804000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1154.049536][T30985] loop4: detected capacity change from 0 to 264192 [ 1154.051489][ T1440] loop0: p1 < > p2 p3 p4 [ 1154.060455][ T1440] loop0: partition table partially beyond EOD, truncated [ 1154.067554][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1154.071910][T30996] loop1: detected capacity change from 0 to 264192 [ 1154.073708][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1154.076946][T30997] loop5: detected capacity change from 0 to 264192 06:42:31 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0f00005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:31 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5000f0000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1154.081603][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1154.102329][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:31 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000000000630008000000000000006c4000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:31 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700fc0300000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1154.160988][ T1440] loop0: p1 < > p2 p3 p4 [ 1154.165387][ T1440] loop0: partition table partially beyond EOD, truncated [ 1154.172539][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1154.178535][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1154.184728][T31002] netem: invalid attributes len -24 [ 1154.186201][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1154.198796][T31003] netem: invalid attributes len -24 [ 1154.199129][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:31 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000001c0002"], 0x8c}}, 0x0) 06:42:31 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000834000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1154.224441][ T1440] loop0: p1 < > p2 p3 p4 [ 1154.228852][ T1440] loop0: partition table partially beyond EOD, truncated [ 1154.235999][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1154.241959][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1154.249857][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1154.257628][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1154.314819][ T1440] loop0: p1 < > p2 p3 p4 [ 1154.317216][T31009] loop5: detected capacity change from 0 to 264192 [ 1154.319195][ T1440] loop0: partition table partially beyond EOD, truncated [ 1154.332792][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1154.338845][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1154.346400][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1154.353917][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:31 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d1000005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1154.389500][T31017] loop1: detected capacity change from 0 to 264192 [ 1154.409730][ T1440] loop0: p1 < > p2 p3 p4 [ 1154.414102][ T1440] loop0: partition table partially beyond EOD, truncated [ 1154.421202][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1154.427328][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated 06:42:31 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500110000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:31 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000001f0002"], 0x8c}}, 0x0) 06:42:31 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000744000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1154.427997][T31019] loop4: detected capacity change from 0 to 264192 [ 1154.437475][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1154.449672][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1154.497774][T31023] loop4: detected capacity change from 0 to 264192 [ 1154.506033][ T1440] loop0: p1 < > p2 p3 p4 [ 1154.510384][ T1440] loop0: partition table partially beyond EOD, truncated [ 1154.517481][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1154.523528][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1154.531635][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1154.540330][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:31 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000ffffff854000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:31 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700fe0300000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1154.559877][ T1440] loop0: p1 < > p2 p3 p4 [ 1154.564408][ T1440] loop0: partition table partially beyond EOD, truncated [ 1154.571477][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1154.577462][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1154.585330][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1154.592966][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:31 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d1100005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1154.648849][ T1440] loop0: p1 < > p2 p3 p4 [ 1154.653254][ T1440] loop0: partition table partially beyond EOD, truncated [ 1154.660350][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1154.666333][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1154.673983][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1154.679436][T31034] loop5: detected capacity change from 0 to 264192 [ 1154.684122][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:31 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0200005c0002"], 0x8c}}, 0x0) [ 1154.714677][T31036] __nla_validate_parse: 23 callbacks suppressed [ 1154.714702][T31036] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1154.738766][ T1440] loop0: p1 < > p2 p3 p4 [ 1154.743124][ T1440] loop0: partition table partially beyond EOD, truncated [ 1154.750260][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1154.756241][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated 06:42:31 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500120000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1154.762417][T31038] loop1: detected capacity change from 0 to 264192 [ 1154.764563][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1154.777448][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:31 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000000000630008000000000000007a4000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1154.811330][ T1440] loop0: p1 < > p2 p3 p4 [ 1154.815729][ T1440] loop0: partition table partially beyond EOD, truncated [ 1154.822789][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1154.828784][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1154.836719][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1154.845215][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:32 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000fffffdef4000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1154.868198][ T1440] loop0: p1 < > p2 p3 p4 [ 1154.872570][ T1440] loop0: partition table partially beyond EOD, truncated [ 1154.879722][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1154.885690][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1154.893290][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1154.897817][T31043] loop4: detected capacity change from 0 to 264192 [ 1154.901275][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:32 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d1200005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1154.962192][ T1440] loop0: p1 < > p2 p3 p4 [ 1154.966687][ T1440] loop0: partition table partially beyond EOD, truncated [ 1154.973850][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1154.979951][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1154.987671][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1154.996291][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:32 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0300005c0002"], 0x8c}}, 0x0) [ 1155.008876][T31051] loop4: detected capacity change from 0 to 264192 [ 1155.053638][T31056] loop5: detected capacity change from 0 to 264192 [ 1155.085050][T31058] loop1: detected capacity change from 0 to 264192 06:42:32 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000fffffff64000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:32 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700020400000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:42:32 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000fe4000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:32 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500200000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:32 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d2500005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1155.116787][ T1440] loop0: p1 < > p2 p3 p4 [ 1155.121243][ T1440] loop0: partition table partially beyond EOD, truncated [ 1155.128378][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1155.134465][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1155.142409][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1155.151628][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:32 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0400005c0002"], 0x8c}}, 0x0) [ 1155.210967][ T1440] loop0: p1 < > p2 p3 p4 [ 1155.215565][ T1440] loop0: partition table partially beyond EOD, truncated [ 1155.222600][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1155.228583][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1155.236349][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1155.243912][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1155.262034][ T1440] loop0: p1 < > p2 p3 p4 [ 1155.266487][ T1440] loop0: partition table partially beyond EOD, truncated [ 1155.273610][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1155.279598][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1155.287646][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1155.298628][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:32 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000fffffdfc4000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1155.324372][T31077] loop1: detected capacity change from 0 to 264192 [ 1155.339484][ T1440] loop0: p1 < > p2 p3 p4 [ 1155.343868][ T1440] loop0: partition table partially beyond EOD, truncated [ 1155.350985][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1155.357047][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated 06:42:32 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d2c00005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:32 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0500005c0002"], 0x8c}}, 0x0) [ 1155.369587][T31082] loop5: detected capacity change from 0 to 264192 [ 1155.376451][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1155.384184][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1155.397158][T31086] loop4: detected capacity change from 0 to 264192 [ 1155.411185][ T1440] loop0: p1 < > p2 p3 p4 [ 1155.415592][ T1440] loop0: partition table partially beyond EOD, truncated 06:42:32 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000002500ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:32 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500250000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1155.422628][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1155.428694][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1155.436781][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1155.444549][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1155.471066][ T1440] loop0: p1 < > p2 p3 p4 06:42:32 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000fffffdfd4000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1155.475432][ T1440] loop0: partition table partially beyond EOD, truncated [ 1155.482486][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1155.488485][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1155.496070][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1155.501142][T31088] loop4: detected capacity change from 0 to 264192 [ 1155.503773][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:32 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0600005c0002"], 0x8c}}, 0x0) 06:42:32 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700060400000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1155.566194][ T1440] loop0: p1 < > p2 p3 p4 [ 1155.570580][ T1440] loop0: partition table partially beyond EOD, truncated [ 1155.577660][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1155.583673][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1155.593701][T31100] loop1: detected capacity change from 0 to 264192 [ 1155.608175][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:42:32 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d4800005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1155.617338][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1155.627033][T31104] loop5: detected capacity change from 0 to 264192 06:42:32 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000000da2ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1155.683542][ T1440] loop0: p1 < > p2 p3 p4 [ 1155.687923][ T1440] loop0: partition table partially beyond EOD, truncated [ 1155.695041][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1155.701038][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1155.708827][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1155.716351][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:32 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5003f0000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1155.737408][ T1440] loop0: p1 < > p2 p3 p4 [ 1155.741890][ T1440] loop0: partition table partially beyond EOD, truncated [ 1155.748972][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1155.755018][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1155.762561][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1155.770288][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:32 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000fffffffe4000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:32 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0700005c0002"], 0x8c}}, 0x0) [ 1155.786472][T31112] loop4: detected capacity change from 0 to 264192 [ 1155.806786][ T1440] loop0: p1 < > p2 p3 p4 [ 1155.811146][ T1440] loop0: partition table partially beyond EOD, truncated [ 1155.818253][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1155.824302][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated 06:42:33 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d4c00005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1155.832016][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1155.841369][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1155.856919][T31121] loop1: detected capacity change from 0 to 264192 [ 1155.870529][T31118] loop4: detected capacity change from 0 to 264192 [ 1155.880332][T31122] loop5: detected capacity change from 0 to 264192 06:42:33 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700000500000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:42:33 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000000000630008000000000000000040000a9885a500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1155.907840][ T1440] loop0: p1 < > p2 p3 p4 [ 1155.912178][ T1440] loop0: partition table partially beyond EOD, truncated [ 1155.919422][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1155.925426][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1155.933127][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:42:33 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0800005c0002"], 0x8c}}, 0x0) 06:42:33 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500400000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:33 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000effdffff4000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1155.967887][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1155.991298][ T1440] loop0: p1 < > p2 p3 p4 [ 1155.995679][ T1440] loop0: partition table partially beyond EOD, truncated [ 1156.002936][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1156.008925][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1156.017985][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1156.026960][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1156.040709][ T1440] loop0: p1 < > p2 p3 p4 [ 1156.045070][ T1440] loop0: partition table partially beyond EOD, truncated [ 1156.052171][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1156.058301][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1156.066027][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1156.073882][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:33 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d5800005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1156.119726][ T1440] loop0: p1 < > p2 p3 p4 [ 1156.124093][ T1440] loop0: partition table partially beyond EOD, truncated [ 1156.131333][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1156.137433][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1156.146206][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1156.150867][T31140] loop4: detected capacity change from 0 to 264192 [ 1156.154705][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:33 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000fcfdffff4000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:33 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0900005c0002"], 0x8c}}, 0x0) [ 1156.178390][T31141] loop1: detected capacity change from 0 to 264192 [ 1156.179926][T31144] loop5: detected capacity change from 0 to 264192 [ 1156.196087][ T1440] loop0: p1 < > p2 p3 p4 [ 1156.200459][ T1440] loop0: partition table partially beyond EOD, truncated [ 1156.207584][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1156.213556][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1156.221363][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1156.229022][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1156.232764][T31146] loop4: detected capacity change from 0 to 264192 06:42:33 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500480000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:33 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000000000630008000000000000000040000a9886a500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:33 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d6000005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:33 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff07009f0500000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:42:33 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0a00005c0002"], 0x8c}}, 0x0) 06:42:33 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000fdfdffff4000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1156.358001][ T1440] loop0: p1 < > p2 p3 p4 [ 1156.362339][ T1440] loop0: partition table partially beyond EOD, truncated [ 1156.369522][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1156.375511][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1156.383275][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1156.391076][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1156.405503][ T1440] loop0: p1 < > p2 p3 p4 [ 1156.409944][ T1440] loop0: partition table partially beyond EOD, truncated [ 1156.417202][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1156.423172][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1156.430778][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1156.439148][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1156.512403][T31163] loop1: detected capacity change from 0 to 264192 [ 1156.520682][T31162] loop5: detected capacity change from 0 to 264192 [ 1156.549118][ T1440] loop0: p1 < > p2 p3 p4 [ 1156.553494][ T1440] loop0: partition table partially beyond EOD, truncated 06:42:33 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5004c0000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:33 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000000000630008000000000000000040000a9887a500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:33 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d6800005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1156.560589][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1156.566578][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1156.574399][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1156.584140][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:33 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0b00005c0002"], 0x8c}}, 0x0) [ 1156.641386][T31175] loop4: detected capacity change from 0 to 264192 [ 1156.657477][ T1440] loop0: p1 < > p2 p3 p4 [ 1156.661822][ T1440] loop0: partition table partially beyond EOD, truncated [ 1156.668998][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1156.675035][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1156.682494][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:42:33 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff070000000000006300080000000085ffffff4000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1156.690543][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1156.706635][ T1440] loop0: p1 < > p2 p3 p4 [ 1156.711006][ T1440] loop0: partition table partially beyond EOD, truncated [ 1156.718118][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1156.724137][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1156.732091][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1156.739661][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1156.745763][T31177] loop4: detected capacity change from 0 to 264192 06:42:33 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700c50500000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:42:33 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0c00005c0002"], 0x8c}}, 0x0) [ 1156.783795][T31182] loop1: detected capacity change from 0 to 264192 [ 1156.797014][T31183] loop5: detected capacity change from 0 to 264192 06:42:33 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d6c00005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:34 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500680000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:34 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000000000630008000000000000000040000a9888a500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:34 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000f6ffffff4000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1156.898501][ T1440] loop0: p1 < > p2 p3 p4 [ 1156.902835][ T1440] loop0: partition table partially beyond EOD, truncated [ 1156.910065][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1156.916122][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1156.923792][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1156.933593][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1156.949193][ T1440] loop0: p1 < > p2 p3 p4 [ 1156.953513][ T1440] loop0: partition table partially beyond EOD, truncated [ 1156.960658][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1156.966645][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1156.974479][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1156.982118][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:34 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0d00005c0002"], 0x8c}}, 0x0) [ 1157.026658][T31203] loop4: detected capacity change from 0 to 264192 [ 1157.038015][ T1440] loop0: p1 < > p2 p3 p4 [ 1157.042528][ T1440] loop0: partition table partially beyond EOD, truncated [ 1157.045997][T31205] loop1: detected capacity change from 0 to 264192 [ 1157.049633][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1157.062018][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated 06:42:34 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d7400005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1157.072185][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1157.074226][T31207] loop5: detected capacity change from 0 to 264192 [ 1157.086153][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:34 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000feffffff4000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:34 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000000000630008000000000000000040000a9889a500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:34 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0e00005c0002"], 0x8c}}, 0x0) [ 1157.119684][ T1440] loop0: p1 < > p2 p3 p4 [ 1157.124031][ T1440] loop0: partition table partially beyond EOD, truncated [ 1157.131297][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1157.137332][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1157.145396][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1157.156308][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1157.162535][T31209] loop4: detected capacity change from 0 to 264192 06:42:34 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5006c0000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:34 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700000600000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:42:34 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d7a00005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:34 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000020000000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1157.288207][T31227] loop1: detected capacity change from 0 to 264192 [ 1157.298776][ T1440] loop0: p1 < > p2 p3 p4 [ 1157.303117][ T1440] loop0: partition table partially beyond EOD, truncated [ 1157.310255][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1157.316250][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1157.323773][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:42:34 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000000000630008000000000000000040000a988aa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1157.332176][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:34 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0f00005c0002"], 0x8c}}, 0x0) [ 1157.383576][T31232] loop5: detected capacity change from 0 to 264192 [ 1157.428269][ T1440] loop0: p1 < > p2 p3 p4 [ 1157.432620][ T1440] loop0: partition table partially beyond EOD, truncated [ 1157.439766][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1157.445756][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1157.454066][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1157.464443][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:34 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500740000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:34 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656db202005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:34 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000020000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1157.480310][T31241] loop4: detected capacity change from 0 to 264192 [ 1157.503722][ T1440] loop0: p1 < > p2 p3 p4 [ 1157.508122][ T1440] loop0: partition table partially beyond EOD, truncated [ 1157.515263][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1157.521433][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated 06:42:34 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d1000005c0002"], 0x8c}}, 0x0) [ 1157.529119][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1157.537405][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1157.551720][T31246] loop1: detected capacity change from 0 to 264192 [ 1157.559170][ T1440] loop0: p1 < > p2 p3 p4 [ 1157.563492][ T1440] loop0: partition table partially beyond EOD, truncated [ 1157.570657][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1157.576671][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1157.584269][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1157.592440][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1157.597768][T31245] loop4: detected capacity change from 0 to 264192 [ 1157.618069][ T1440] loop0: p1 < > p2 p3 p4 [ 1157.622512][ T1440] loop0: partition table partially beyond EOD, truncated 06:42:34 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000000000630008000000000000000040000a988ba500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:34 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000100000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:34 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700040600000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1157.629581][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1157.635593][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1157.643490][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1157.657368][T31254] loop5: detected capacity change from 0 to 264192 [ 1157.665252][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:34 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d1100005c0002"], 0x8c}}, 0x0) 06:42:34 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0003005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:34 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5007a0000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1157.716617][ T1440] loop0: p1 < > p2 p3 p4 [ 1157.721070][ T1440] loop0: partition table partially beyond EOD, truncated [ 1157.728295][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1157.734398][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1157.742215][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1157.750080][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1157.837533][ T1440] loop0: p1 < > p2 p3 p4 [ 1157.841874][ T1440] loop0: partition table partially beyond EOD, truncated [ 1157.849032][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1157.855042][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1157.862886][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1157.867284][T31270] loop1: detected capacity change from 0 to 264192 [ 1157.870985][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:35 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d1200005c0002"], 0x8c}}, 0x0) [ 1157.912441][T31275] loop4: detected capacity change from 0 to 264192 [ 1157.923304][ T1440] loop0: p1 < > p2 p3 p4 [ 1157.923344][T31273] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1157.927702][ T1440] loop0: partition table partially beyond EOD, truncated [ 1157.944129][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1157.950284][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated 06:42:35 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004002ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:35 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000007ffff00000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:35 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0005005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1157.958267][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1157.973261][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1157.974891][T31280] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1157.998343][ T1440] loop0: p1 < > p2 p3 p4 [ 1158.002681][ T1440] loop0: partition table partially beyond EOD, truncated 06:42:35 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700000700000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1158.009788][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1158.015808][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1158.023655][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1158.029805][T31279] loop4: detected capacity change from 0 to 264192 [ 1158.031401][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1158.043421][T31281] loop5: detected capacity change from 0 to 264192 06:42:35 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500810000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1158.128998][ T1440] loop0: p1 < > p2 p3 p4 [ 1158.133355][ T1440] loop0: partition table partially beyond EOD, truncated [ 1158.140459][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1158.146478][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1158.153997][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1158.162562][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:35 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d2500005c0002"], 0x8c}}, 0x0) [ 1158.176099][T31288] loop1: detected capacity change from 0 to 264192 06:42:35 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000000100ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1158.202333][T31290] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1158.207697][ T1440] loop0: p1 < > p2 p3 p4 [ 1158.216030][ T1440] loop0: partition table partially beyond EOD, truncated [ 1158.223077][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1158.229068][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1158.239834][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:42:35 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0006005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:35 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004003ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1158.245816][T31293] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1158.247871][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1158.334536][T31295] loop4: detected capacity change from 0 to 264192 [ 1158.377834][T31298] loop5: detected capacity change from 0 to 264192 [ 1158.381399][ T1440] loop0: p1 < > p2 p3 p4 [ 1158.388762][ T1440] loop0: partition table partially beyond EOD, truncated [ 1158.395828][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1158.401840][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1158.409390][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1158.418940][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1158.421209][T31300] loop4: detected capacity change from 0 to 264192 06:42:35 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d4800005c0002"], 0x8c}}, 0x0) 06:42:35 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000200004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:35 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500900000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:35 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700000900000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1158.485105][T31307] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1158.515068][T31310] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. 06:42:35 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0007005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1158.530573][T31312] loop1: detected capacity change from 0 to 264192 [ 1158.543747][ T1440] loop0: p1 < > p2 p3 p4 [ 1158.548175][ T1440] loop0: partition table partially beyond EOD, truncated [ 1158.555309][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1158.561292][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1158.568805][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1158.576931][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:35 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004004ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1158.645653][ T1440] loop0: p1 < > p2 p3 p4 [ 1158.650080][ T1440] loop0: partition table partially beyond EOD, truncated [ 1158.657360][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1158.663368][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1158.671152][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1158.679533][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:35 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d4c00005c0002"], 0x8c}}, 0x0) [ 1158.728370][T31321] loop5: detected capacity change from 0 to 264192 [ 1158.730793][ T1440] loop0: p1 < > p2 p3 p4 [ 1158.739292][ T1440] loop0: partition table partially beyond EOD, truncated [ 1158.742205][T31322] loop4: detected capacity change from 0 to 264192 [ 1158.746362][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1158.746377][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1158.747783][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:42:35 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000300004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1158.767145][T31323] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1158.774003][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1158.810535][T31327] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1158.823215][ T1440] loop0: p1 < > p2 p3 p4 06:42:35 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0009005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:36 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5059f0000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1158.827617][ T1440] loop0: partition table partially beyond EOD, truncated [ 1158.834687][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1158.840876][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1158.849135][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1158.859190][T31325] loop4: detected capacity change from 0 to 264192 [ 1158.863066][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:36 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700000a00000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:42:36 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d5800005c0002"], 0x8c}}, 0x0) [ 1158.910672][T31329] loop1: detected capacity change from 0 to 264192 [ 1158.977869][ T1440] loop0: p1 < > p2 p3 p4 [ 1158.982220][ T1440] loop0: partition table partially beyond EOD, truncated [ 1158.989439][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1158.995664][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1159.007694][T31336] loop5: detected capacity change from 0 to 264192 [ 1159.014021][T31337] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. 06:42:36 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000400004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1159.023950][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1159.032151][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1159.047737][ T1440] loop0: p1 < > p2 p3 p4 [ 1159.052076][ T1440] loop0: partition table partially beyond EOD, truncated [ 1159.059184][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1159.065244][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated 06:42:36 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004005ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:36 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d000a005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:36 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa505c50000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1159.073044][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1159.080659][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:36 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d6000005c0002"], 0x8c}}, 0x0) [ 1159.128173][T31347] loop4: detected capacity change from 0 to 264192 [ 1159.182118][ T1440] loop0: p1 < > p2 p3 p4 [ 1159.186489][ T1440] loop0: partition table partially beyond EOD, truncated [ 1159.193550][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1159.199539][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1159.209166][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1159.217203][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1159.220408][T31349] loop4: detected capacity change from 0 to 264192 06:42:36 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000500004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:36 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d000b005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:36 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700000b00000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1159.237499][T31355] loop1: detected capacity change from 0 to 264192 [ 1159.270029][T31360] loop5: detected capacity change from 0 to 264192 06:42:36 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d6800005c0002"], 0x8c}}, 0x0) 06:42:36 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004006ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:36 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5fffe0000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1159.329199][ T1440] loop0: p1 < > p2 p3 p4 [ 1159.333590][ T1440] loop0: partition table partially beyond EOD, truncated [ 1159.340802][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1159.346806][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1159.354268][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1159.362400][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:36 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000600004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:36 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d000c005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1159.437916][ T1440] loop0: p1 < > p2 p3 p4 [ 1159.442339][ T1440] loop0: partition table partially beyond EOD, truncated [ 1159.449442][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1159.455451][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1159.471153][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1159.479031][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1159.494868][ T1440] loop0: p1 < > p2 p3 p4 [ 1159.499394][ T1440] loop0: partition table partially beyond EOD, truncated [ 1159.506488][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1159.512527][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1159.520237][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1159.527927][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:36 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d6c00005c0002"], 0x8c}}, 0x0) [ 1159.542414][T31377] loop1: detected capacity change from 0 to 264192 [ 1159.554532][T31379] loop4: detected capacity change from 0 to 264192 [ 1159.595455][ T1440] loop0: p1 < > p2 p3 p4 [ 1159.596644][T31381] loop5: detected capacity change from 0 to 264192 [ 1159.599906][ T1440] loop0: partition table partially beyond EOD, truncated [ 1159.613568][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1159.619667][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1159.627421][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1159.635004][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:36 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004007ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:36 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000800004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1159.652662][T31382] loop4: detected capacity change from 0 to 264192 06:42:36 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa50fff0000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1159.698768][ T1440] loop0: p1 < > p2 p3 p4 [ 1159.703124][ T1440] loop0: partition table partially beyond EOD, truncated [ 1159.710246][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1159.716219][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1159.723591][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1159.731882][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1159.734608][T31386] __nla_validate_parse: 4 callbacks suppressed 06:42:36 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700000c00000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1159.734621][T31386] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. 06:42:36 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d000d005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:36 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d7400005c0002"], 0x8c}}, 0x0) [ 1159.847226][ T1440] loop0: p1 < > p2 p3 p4 [ 1159.851664][ T1440] loop0: partition table partially beyond EOD, truncated [ 1159.858926][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1159.864921][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1159.866993][T31397] loop1: detected capacity change from 0 to 264192 [ 1159.872662][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1159.886374][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1159.913334][ T1440] loop0: p1 < > p2 p3 p4 [ 1159.917711][ T1440] loop0: partition table partially beyond EOD, truncated [ 1159.925070][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1159.926371][T31402] loop5: detected capacity change from 0 to 264192 [ 1159.931052][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1159.931540][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1159.952420][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:37 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000a00004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1159.953622][T31403] loop4: detected capacity change from 0 to 264192 06:42:37 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004008ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:37 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d7a00005c0002"], 0x8c}}, 0x0) [ 1159.991803][T31406] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1160.002136][ T1440] loop0: p1 < > p2 p3 p4 [ 1160.006614][ T1440] loop0: partition table partially beyond EOD, truncated [ 1160.013881][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1160.019920][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1160.029236][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:42:37 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5feff0000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:37 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d000e005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1160.036984][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1160.049873][T31412] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1160.069285][T31408] loop4: detected capacity change from 0 to 264192 06:42:37 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000b00004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1160.094293][ T1440] loop0: p1 < > p2 p3 p4 [ 1160.098741][ T1440] loop0: partition table partially beyond EOD, truncated [ 1160.105855][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1160.111891][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1160.120095][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1160.127937][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:37 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700000d00000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:42:37 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0003005c0002"], 0x8c}}, 0x0) [ 1160.201392][ T1440] loop0: p1 < > p2 p3 p4 [ 1160.201773][T31417] loop1: detected capacity change from 0 to 264192 [ 1160.205804][ T1440] loop0: partition table partially beyond EOD, truncated [ 1160.219457][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1160.225508][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1160.233075][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1160.241929][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:37 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004009ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1160.274772][T31422] loop5: detected capacity change from 0 to 264192 [ 1160.298139][T31423] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1160.310255][ T1440] loop0: p1 < > p2 p3 p4 [ 1160.314606][ T1440] loop0: partition table partially beyond EOD, truncated 06:42:37 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d000f005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:37 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5f8070400000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1160.321888][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1160.327967][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1160.337393][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1160.343736][T31427] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1160.345871][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1160.409526][ T1440] loop0: p1 < > p2 p3 p4 [ 1160.413897][ T1440] loop0: partition table partially beyond EOD, truncated [ 1160.422230][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1160.423087][T31430] loop4: detected capacity change from 0 to 264192 [ 1160.428304][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1160.429869][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1160.449645][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:37 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000001800004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1160.467946][ T1440] loop0: p1 < > p2 p3 p4 [ 1160.472362][ T1440] loop0: partition table partially beyond EOD, truncated [ 1160.479541][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1160.485536][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1160.493141][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1160.500739][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:37 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0005005c0002"], 0x8c}}, 0x0) [ 1160.512745][T31432] loop4: detected capacity change from 0 to 264192 [ 1160.533053][T31434] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1160.546052][T31435] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. 06:42:37 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700000e00000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1160.593916][T31436] loop1: detected capacity change from 0 to 264192 [ 1160.632914][T31439] loop5: detected capacity change from 0 to 264192 [ 1160.648566][ T1440] loop0: p1 < > p2 p3 p4 [ 1160.652922][ T1440] loop0: partition table partially beyond EOD, truncated [ 1160.656154][T31440] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1160.660013][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1160.675230][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1160.684822][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:42:37 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff070000000000006300080000000000000000400affffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1160.692937][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1160.703485][T31444] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. 06:42:37 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0011005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:37 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5ff070400000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1160.763760][ T1440] loop0: p1 < > p2 p3 p4 [ 1160.768231][ T1440] loop0: partition table partially beyond EOD, truncated [ 1160.775593][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1160.781580][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1160.789312][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1160.796931][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:37 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000002000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:37 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0006005c0002"], 0x8c}}, 0x0) [ 1160.815747][T31448] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1160.829998][ T1440] loop0: p1 < > p2 p3 p4 [ 1160.834369][ T1440] loop0: partition table partially beyond EOD, truncated [ 1160.841533][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1160.847542][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1160.855270][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1160.862799][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1160.919703][T31452] loop4: detected capacity change from 0 to 264192 [ 1160.933045][T31454] loop1: detected capacity change from 0 to 264192 06:42:38 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0012005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1160.986146][T31459] loop5: detected capacity change from 0 to 264192 [ 1160.998014][T31456] loop4: detected capacity change from 0 to 264192 06:42:38 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff070000000000006300080000000000000000400bffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:38 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0007005c0002"], 0x8c}}, 0x0) 06:42:38 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700000f00000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1161.028939][ T1440] loop0: p1 < > p2 p3 p4 [ 1161.033309][ T1440] loop0: partition table partially beyond EOD, truncated [ 1161.040430][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1161.046444][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1161.055039][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1161.062801][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:38 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500080400000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1161.091436][ T1440] loop0: p1 < > p2 p3 p4 [ 1161.095830][ T1440] loop0: partition table partially beyond EOD, truncated [ 1161.103001][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1161.109132][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1161.117305][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1161.124814][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:38 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000002600004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1161.145796][ T1440] loop0: p1 < > p2 p3 p4 [ 1161.150136][ T1440] loop0: partition table partially beyond EOD, truncated [ 1161.157272][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1161.163245][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1161.173381][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1161.180801][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:38 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0009005c0002"], 0x8c}}, 0x0) [ 1161.226414][T31471] loop1: detected capacity change from 0 to 264192 [ 1161.259902][T31479] loop5: detected capacity change from 0 to 264192 [ 1161.269775][T31481] loop4: detected capacity change from 0 to 264192 06:42:38 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0020005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:38 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff070000000000006300080000000000000000400cffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1161.279929][ T1440] loop0: p1 < > p2 p3 p4 [ 1161.284343][ T1440] loop0: partition table partially beyond EOD, truncated [ 1161.291517][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1161.297610][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1161.305302][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1161.313279][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:38 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000007300004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1161.329109][ T1440] loop0: p1 < > p2 p3 p4 [ 1161.333482][ T1440] loop0: partition table partially beyond EOD, truncated [ 1161.340633][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1161.346621][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1161.354062][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1161.361642][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:38 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000800000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:38 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656dc009005c0002"], 0x8c}}, 0x0) [ 1161.379337][T31483] loop4: detected capacity change from 0 to 264192 06:42:38 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700001100000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:42:38 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0025005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:38 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000008300004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1161.453607][T31495] loop1: detected capacity change from 0 to 264192 [ 1161.483975][ T1440] loop0: p1 < > p2 p3 p4 [ 1161.488384][ T1440] loop0: partition table partially beyond EOD, truncated [ 1161.495501][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1161.501589][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1161.509451][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1161.517415][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1161.533586][ T1440] loop0: p1 < > p2 p3 p4 [ 1161.537951][ T1440] loop0: partition table partially beyond EOD, truncated [ 1161.545067][ T1440] loop0: p1 start 1 is beyond EOD, truncated 06:42:38 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff070000000000006300080000000000000000400dffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:38 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d000a005c0002"], 0x8c}}, 0x0) [ 1161.551045][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1161.558817][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1161.559827][T31500] loop5: detected capacity change from 0 to 264192 [ 1161.566918][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:38 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa540000800000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1161.623968][T31504] loop4: detected capacity change from 0 to 264192 [ 1161.651326][ T1440] loop0: p1 < > p2 p3 p4 [ 1161.655708][ T1440] loop0: partition table partially beyond EOD, truncated [ 1161.662764][ T1440] loop0: p1 start 1 is beyond EOD, truncated 06:42:38 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff070000000000006300080000000000fe00004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:38 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d002c005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1161.668848][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1161.676922][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1161.684497][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1161.700291][T31508] loop4: detected capacity change from 0 to 264192 06:42:38 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700001200000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:42:38 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d000b005c0002"], 0x8c}}, 0x0) [ 1161.734552][T31514] loop1: detected capacity change from 0 to 264192 06:42:38 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff070000000000006300080000000000000000400effffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1161.788545][T31518] loop5: detected capacity change from 0 to 264192 [ 1161.798397][ T1440] loop0: p1 < > p2 p3 p4 [ 1161.802728][ T1440] loop0: partition table partially beyond EOD, truncated [ 1161.809882][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1161.815929][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1161.823379][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1161.831545][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:39 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500040800000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:39 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d8847005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:39 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000402004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:39 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d000c005c0002"], 0x8c}}, 0x0) [ 1161.907324][ T1440] loop0: p1 < > p2 p3 p4 [ 1161.911793][ T1440] loop0: partition table partially beyond EOD, truncated [ 1161.918930][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1161.924932][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1161.932463][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1161.941145][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1161.958829][ T1440] loop0: p1 < > p2 p3 p4 [ 1161.963154][ T1440] loop0: partition table partially beyond EOD, truncated [ 1161.970358][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1161.976369][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1161.977675][T31530] loop4: detected capacity change from 0 to 264192 [ 1161.983858][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1161.997802][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1162.022187][T31533] loop1: detected capacity change from 0 to 264192 [ 1162.049822][T31535] loop5: detected capacity change from 0 to 264192 06:42:39 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff070000000000006300080000000000000000400fffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1162.068517][ T1440] loop0: p1 < > p2 p3 p4 [ 1162.072940][ T1440] loop0: partition table partially beyond EOD, truncated [ 1162.077065][T31534] loop4: detected capacity change from 0 to 264192 [ 1162.080032][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1162.092460][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1162.100499][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1162.108478][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:39 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500004000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:39 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d000d005c0002"], 0x8c}}, 0x0) 06:42:39 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700031d00000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:42:39 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000003004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:39 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0048005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1162.162972][ T1440] loop0: p1 < > p2 p3 p4 [ 1162.167346][ T1440] loop0: partition table partially beyond EOD, truncated [ 1162.174401][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1162.180648][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1162.189584][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1162.197409][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1162.281094][T31549] loop1: detected capacity change from 0 to 264192 [ 1162.322135][ T1440] loop0: p1 < > p2 p3 p4 [ 1162.326552][ T1440] loop0: partition table partially beyond EOD, truncated [ 1162.333659][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1162.339684][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1162.350930][T31555] loop5: detected capacity change from 0 to 264192 [ 1162.352327][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1162.365312][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:39 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d000e005c0002"], 0x8c}}, 0x0) 06:42:39 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004010ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:39 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000008003004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1162.380788][T31559] loop4: detected capacity change from 0 to 264192 [ 1162.417500][ T1440] loop0: p1 < > p2 p3 p4 [ 1162.421965][ T1440] loop0: partition table partially beyond EOD, truncated 06:42:39 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d8848005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:39 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500008100000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:39 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d000f005c0002"], 0x8c}}, 0x0) [ 1162.429100][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1162.435088][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1162.442608][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1162.450191][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1162.464169][T31564] loop4: detected capacity change from 0 to 264192 [ 1162.496157][ T1440] loop0: p1 < > p2 p3 p4 [ 1162.500556][ T1440] loop0: partition table partially beyond EOD, truncated [ 1162.507625][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1162.513602][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1162.521198][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1162.530177][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:39 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000204004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:39 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700021f00000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1162.556467][T31570] loop1: detected capacity change from 0 to 264192 [ 1162.619104][ T1440] loop0: p1 < > p2 p3 p4 [ 1162.623461][ T1440] loop0: partition table partially beyond EOD, truncated [ 1162.630686][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1162.636678][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1162.644033][T31579] loop5: detected capacity change from 0 to 264192 [ 1162.650799][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:42:39 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0011005c0002"], 0x8c}}, 0x0) 06:42:39 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004011ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:39 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d004c005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1162.668707][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:39 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500009000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1162.719640][ T1440] loop0: p1 < > p2 p3 p4 [ 1162.723983][ T1440] loop0: partition table partially beyond EOD, truncated [ 1162.731104][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1162.737152][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1162.744735][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1162.752274][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:39 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000604004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1162.780459][ T1440] loop0: p1 < > p2 p3 p4 [ 1162.784824][ T1440] loop0: partition table partially beyond EOD, truncated [ 1162.787910][T31588] loop4: detected capacity change from 0 to 264192 [ 1162.791931][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1162.804333][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1162.811964][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1162.820638][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:39 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0012005c0002"], 0x8c}}, 0x0) [ 1162.839374][ T1440] loop0: p1 < > p2 p3 p4 [ 1162.843734][ T1440] loop0: partition table partially beyond EOD, truncated [ 1162.850871][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1162.857012][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1162.867285][T31595] loop1: detected capacity change from 0 to 264192 [ 1162.877611][T31592] loop4: detected capacity change from 0 to 264192 06:42:40 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0058005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1162.880255][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1162.892023][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1162.925636][T31600] loop5: detected capacity change from 0 to 264192 06:42:40 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700002000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:42:40 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004012ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:40 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000001000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1162.950727][ T1440] loop0: p1 < > p2 p3 p4 [ 1162.955121][ T1440] loop0: partition table partially beyond EOD, truncated [ 1162.962180][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1162.968190][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1162.975991][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1162.984053][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1163.034269][ T1440] loop0: p1 < > p2 p3 p4 [ 1163.038725][ T1440] loop0: partition table partially beyond EOD, truncated [ 1163.045785][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1163.051972][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1163.060499][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1163.068682][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:40 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0020005c0002"], 0x8c}}, 0x0) 06:42:40 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000005004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:40 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d6558005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1163.093838][ T1440] loop0: p1 < > p2 p3 p4 [ 1163.098227][ T1440] loop0: partition table partially beyond EOD, truncated [ 1163.105314][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1163.111270][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1163.118892][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1163.127843][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1163.184809][T31617] loop4: detected capacity change from 0 to 264192 [ 1163.184809][T31616] loop1: detected capacity change from 0 to 264192 06:42:40 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004025ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1163.230849][T31618] loop5: detected capacity change from 0 to 264192 [ 1163.259848][ T1440] loop0: p1 < > p2 p3 p4 [ 1163.264192][ T1440] loop0: partition table partially beyond EOD, truncated [ 1163.271246][ T1440] loop0: p1 start 1 is beyond EOD, truncated 06:42:40 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0025005c0002"], 0x8c}}, 0x0) 06:42:40 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000002000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:40 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000006004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1163.277248][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1163.285360][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1163.290665][T31619] loop4: detected capacity change from 0 to 264192 [ 1163.293064][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:40 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700022000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1163.347256][ T1440] loop0: p1 < > p2 p3 p4 [ 1163.351593][ T1440] loop0: partition table partially beyond EOD, truncated [ 1163.358928][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1163.364924][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1163.372614][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1163.381552][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:40 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0060005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1163.391632][T31631] loop1: detected capacity change from 0 to 264192 06:42:40 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0040005c0002"], 0x8c}}, 0x0) [ 1163.442478][ T1440] loop0: p1 < > p2 p3 p4 [ 1163.446869][ T1440] loop0: partition table partially beyond EOD, truncated [ 1163.453912][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1163.460013][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1163.467761][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1163.474332][T31636] loop5: detected capacity change from 0 to 264192 [ 1163.476034][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:40 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004048ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:40 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000406004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1163.527594][ T1440] loop0: p1 < > p2 p3 p4 [ 1163.532011][ T1440] loop0: partition table partially beyond EOD, truncated [ 1163.539111][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1163.545090][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1163.552672][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1163.561990][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1163.567483][T31642] loop4: detected capacity change from 0 to 264192 06:42:40 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000402000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:40 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d5865005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1163.580225][ T1440] loop0: p1 < > p2 p3 p4 [ 1163.584574][ T1440] loop0: partition table partially beyond EOD, truncated [ 1163.591715][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1163.597700][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1163.605448][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1163.613123][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1163.670607][T31645] loop4: detected capacity change from 0 to 264192 [ 1163.680768][ T1440] loop0: p1 < > p2 p3 p4 [ 1163.685143][ T1440] loop0: partition table partially beyond EOD, truncated [ 1163.692290][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1163.698323][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1163.706467][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1163.714069][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:40 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff070000000000006300080000000000000a004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:40 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700002500000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:42:40 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d8847005c0002"], 0x8c}}, 0x0) [ 1163.744745][T31657] loop5: detected capacity change from 0 to 264192 [ 1163.750457][T31655] loop1: detected capacity change from 0 to 264192 06:42:40 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000003000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1163.799168][ T1440] loop0: p1 < > p2 p3 p4 [ 1163.803519][ T1440] loop0: partition table partially beyond EOD, truncated [ 1163.810775][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1163.817228][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1163.825398][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1163.840104][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:41 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0068005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:41 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff070000000000006300080000000000000000404cffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1163.860705][ T1440] loop0: p1 < > p2 p3 p4 [ 1163.865097][ T1440] loop0: partition table partially beyond EOD, truncated [ 1163.872172][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1163.878189][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1163.886141][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1163.893597][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1163.938614][ T1440] loop0: p1 < > p2 p3 p4 [ 1163.942956][ T1440] loop0: partition table partially beyond EOD, truncated [ 1163.950056][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1163.956076][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1163.963521][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1163.972077][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:41 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0048005c0002"], 0x8c}}, 0x0) [ 1164.017485][ T1440] loop0: p1 < > p2 p3 p4 [ 1164.021844][ T1440] loop0: partition table partially beyond EOD, truncated [ 1164.028963][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1164.034987][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1164.042874][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1164.051180][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:41 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff070000000000006300080000000000000b004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1164.063339][T31675] loop4: detected capacity change from 0 to 264192 [ 1164.073384][ T1440] loop0: p1 < > p2 p3 p4 [ 1164.077767][ T1440] loop0: partition table partially beyond EOD, truncated [ 1164.079794][T31677] loop5: detected capacity change from 0 to 264192 [ 1164.084887][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1164.097370][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1164.106658][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:42:41 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d006c005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1164.115013][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:41 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000004000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1164.140266][T31682] loop1: detected capacity change from 0 to 264192 [ 1164.153893][T31681] loop4: detected capacity change from 0 to 264192 06:42:41 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700002600000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:42:41 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004068ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:41 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d8848005c0002"], 0x8c}}, 0x0) [ 1164.211833][ T1440] loop0: p1 < > p2 p3 p4 [ 1164.216214][ T1440] loop0: partition table partially beyond EOD, truncated [ 1164.223296][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1164.229268][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1164.237110][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1164.244762][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:41 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000018004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1164.301710][ T1440] loop0: p1 < > p2 p3 p4 [ 1164.306079][ T1440] loop0: partition table partially beyond EOD, truncated [ 1164.313175][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1164.319156][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1164.326810][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1164.334376][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:41 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0074005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1164.359219][ T1440] loop0: p1 < > p2 p3 p4 [ 1164.363607][ T1440] loop0: partition table partially beyond EOD, truncated [ 1164.370765][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1164.376757][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1164.384446][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1164.392124][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1164.429438][T31696] loop5: detected capacity change from 0 to 264192 06:42:41 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d004c005c0002"], 0x8c}}, 0x0) [ 1164.470569][T31698] loop1: detected capacity change from 0 to 264192 [ 1164.478772][T31699] loop4: detected capacity change from 0 to 264192 [ 1164.503624][ T1440] loop0: p1 < > p2 p3 p4 [ 1164.507995][ T1440] loop0: partition table partially beyond EOD, truncated [ 1164.515075][ T1440] loop0: p1 start 1 is beyond EOD, truncated 06:42:41 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000005000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:41 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff070000000000006300080000000000000000406cffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1164.521044][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1164.528837][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1164.541422][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1164.553607][T31703] loop4: detected capacity change from 0 to 264192 06:42:41 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000020004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1164.593286][ T1440] loop0: p1 < > p2 p3 p4 [ 1164.597687][ T1440] loop0: partition table partially beyond EOD, truncated [ 1164.604791][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1164.610769][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1164.618283][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1164.626380][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:41 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700002c00000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:42:41 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d007a005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1164.699324][ T1440] loop0: p1 < > p2 p3 p4 [ 1164.703664][ T1440] loop0: partition table partially beyond EOD, truncated [ 1164.710785][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1164.716778][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1164.724501][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1164.732122][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1164.734987][T31714] __nla_validate_parse: 50 callbacks suppressed [ 1164.735002][T31714] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. 06:42:41 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0058005c0002"], 0x8c}}, 0x0) [ 1164.774316][T31717] loop5: detected capacity change from 0 to 264192 [ 1164.785066][T31718] loop1: detected capacity change from 0 to 264192 [ 1164.788864][ T1440] loop0: p1 < > p2 p3 p4 [ 1164.795940][ T1440] loop0: partition table partially beyond EOD, truncated [ 1164.803042][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1164.809019][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated 06:42:41 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000026004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1164.819641][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1164.827380][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1164.847801][ T1440] loop0: p1 < > p2 p3 p4 [ 1164.852162][ T1440] loop0: partition table partially beyond EOD, truncated [ 1164.859284][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1164.865311][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated 06:42:42 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000006000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:42 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004074ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1164.873376][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1164.890407][T31723] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1164.909905][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:42 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0081005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1164.910743][T31726] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1164.941877][T31728] loop4: detected capacity change from 0 to 264192 06:42:42 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d6558005c0002"], 0x8c}}, 0x0) [ 1164.976854][T31729] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1164.987686][T31730] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1165.011012][T31731] loop4: detected capacity change from 0 to 264192 06:42:42 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff070000000000006300080000000000003f004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1165.024163][ T1440] loop0: p1 < > p2 p3 p4 [ 1165.028584][ T1440] loop0: partition table partially beyond EOD, truncated [ 1165.035640][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1165.041611][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1165.050038][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1165.057683][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:42 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700032d00000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1165.091467][T31737] loop5: detected capacity change from 0 to 264192 [ 1165.094840][ T1440] loop0: p1 < > p2 p3 p4 [ 1165.102325][ T1440] loop0: partition table partially beyond EOD, truncated [ 1165.109433][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1165.115416][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1165.119415][T31738] loop1: detected capacity change from 0 to 264192 [ 1165.130274][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:42:42 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d4788005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1165.131474][T31739] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1165.138557][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:42 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000406000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:42 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff070000000000006300080000000000000000407affffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:42 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0060005c0002"], 0x8c}}, 0x0) [ 1165.230709][ T1440] loop0: p1 < > p2 p3 p4 [ 1165.235195][ T1440] loop0: partition table partially beyond EOD, truncated [ 1165.242400][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1165.248486][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1165.256302][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1165.263993][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:42 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000040004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1165.301200][ T1440] loop0: p1 < > p2 p3 p4 [ 1165.305675][ T1440] loop0: partition table partially beyond EOD, truncated [ 1165.312884][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1165.318977][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1165.326590][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1165.331240][T31750] loop4: detected capacity change from 0 to 264192 [ 1165.334679][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1165.360840][ T1440] loop0: p1 < > p2 p3 p4 [ 1165.365208][ T1440] loop0: partition table partially beyond EOD, truncated [ 1165.372318][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1165.378300][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1165.388046][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1165.395818][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1165.409326][T31752] loop4: detected capacity change from 0 to 264192 06:42:42 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d4888005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:42 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700003200000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:42:42 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d5865005c0002"], 0x8c}}, 0x0) [ 1165.505265][T31762] loop5: detected capacity change from 0 to 264192 [ 1165.518066][T31763] loop1: detected capacity change from 0 to 264192 [ 1165.525303][T31764] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1165.536175][T31766] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. 06:42:42 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff07000000000000630008000000000000000040feffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:42 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000007000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1165.560224][ T1440] loop0: p1 < > p2 p3 p4 [ 1165.564645][ T1440] loop0: partition table partially beyond EOD, truncated [ 1165.571806][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1165.577905][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1165.585673][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1165.599610][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:42 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000073004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1165.624522][ T1440] loop0: p1 < > p2 p3 p4 [ 1165.628896][ T1440] loop0: partition table partially beyond EOD, truncated [ 1165.636057][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1165.642017][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1165.649948][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1165.657787][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:42 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d02b2005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1165.675083][ T1440] loop0: p1 < > p2 p3 p4 [ 1165.679451][ T1440] loop0: partition table partially beyond EOD, truncated [ 1165.686604][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1165.692657][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1165.706254][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1165.713800][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:42 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0068005c0002"], 0x8c}}, 0x0) [ 1165.755195][T31777] loop4: detected capacity change from 0 to 264192 [ 1165.793709][ T1440] loop0: p1 < > p2 p3 p4 [ 1165.798115][ T1440] loop0: partition table partially beyond EOD, truncated [ 1165.805172][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1165.811131][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1165.818806][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1165.826396][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1165.829527][T31784] loop1: detected capacity change from 0 to 264192 [ 1165.854148][T31786] loop5: detected capacity change from 0 to 264192 [ 1165.854477][T31783] loop4: detected capacity change from 0 to 264192 [ 1165.869127][ T1440] loop0: p1 < > p2 p3 p4 [ 1165.873511][ T1440] loop0: partition table partially beyond EOD, truncated [ 1165.880615][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1165.886611][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1165.894221][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:42:43 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa502000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1165.901841][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:43 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000380004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1165.933891][T31793] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1165.960964][ T1440] loop0: p1 < > p2 p3 p4 [ 1165.965380][ T1440] loop0: partition table partially beyond EOD, truncated [ 1165.972432][ T1440] loop0: p1 start 1 is beyond EOD, truncated 06:42:43 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0002005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:43 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700003f00000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:42:43 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000008000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:43 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d006c005c0002"], 0x8c}}, 0x0) [ 1165.978501][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1165.986775][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1165.994723][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1166.057359][ T1440] loop0: p1 < > p2 p3 p4 [ 1166.061693][ T1440] loop0: partition table partially beyond EOD, truncated [ 1166.068981][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1166.075014][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1166.083260][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1166.085797][T31801] loop1: detected capacity change from 0 to 264192 [ 1166.098146][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1166.129001][T31807] loop5: detected capacity change from 0 to 264192 [ 1166.136827][T31804] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1166.139102][T31808] loop4: detected capacity change from 0 to 264192 [ 1166.149243][ T1440] loop0: p1 < > p2 p3 p4 [ 1166.157033][ T1440] loop0: partition table partially beyond EOD, truncated [ 1166.164285][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1166.170280][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated 06:42:43 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa503000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:43 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0003005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:43 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0074005c0002"], 0x8c}}, 0x0) 06:42:43 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000083004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1166.178340][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1166.187020][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1166.208772][T31812] loop4: detected capacity change from 0 to 264192 06:42:43 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000009000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1166.236053][ T1440] loop0: p1 < > p2 p3 p4 [ 1166.240511][ T1440] loop0: partition table partially beyond EOD, truncated [ 1166.247649][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1166.253629][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1166.261176][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1166.268837][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:43 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700004000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1166.304235][T31815] loop1: detected capacity change from 0 to 264192 06:42:43 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d007a005c0002"], 0x8c}}, 0x0) 06:42:43 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff070000000000006300080000000000fdef004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:43 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa504000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:43 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0004005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1166.365586][T31825] loop5: detected capacity change from 0 to 264192 [ 1166.398506][ T1440] loop0: p1 < > p2 p3 p4 [ 1166.402944][ T1440] loop0: partition table partially beyond EOD, truncated [ 1166.410015][ T1440] loop0: p1 start 1 is beyond EOD, truncated 06:42:43 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa50000000a000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1166.416021][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1166.424234][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1166.432568][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1166.452158][ T1440] loop0: p1 < > p2 p3 p4 [ 1166.456507][ T1440] loop0: partition table partially beyond EOD, truncated [ 1166.463627][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1166.469616][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1166.477220][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1166.484571][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1166.497173][ T1440] loop0: p1 < > p2 p3 p4 [ 1166.501521][ T1440] loop0: partition table partially beyond EOD, truncated [ 1166.508687][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1166.514717][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1166.522701][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1166.530349][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1166.553537][ T1440] loop0: p1 < > p2 p3 p4 [ 1166.557919][ T1440] loop0: partition table partially beyond EOD, truncated [ 1166.565083][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1166.571086][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1166.578557][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1166.586172][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1166.591498][T31834] loop4: detected capacity change from 0 to 264192 06:42:43 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0081005c0002"], 0x8c}}, 0x0) [ 1166.622902][T31840] loop1: detected capacity change from 0 to 264192 [ 1166.631998][ T1440] loop0: p1 < > p2 p3 p4 [ 1166.636395][ T1440] loop0: partition table partially beyond EOD, truncated [ 1166.643523][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1166.649529][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1166.659425][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:42:43 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff070000000000006300080000000000effd004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:43 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0005005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:43 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa505000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1166.667296][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1166.688369][T31842] loop4: detected capacity change from 0 to 264192 [ 1166.700748][ T1440] loop0: p1 < > p2 p3 p4 [ 1166.705136][ T1440] loop0: partition table partially beyond EOD, truncated [ 1166.712345][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1166.718338][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1166.724607][T31845] loop5: detected capacity change from 0 to 264192 [ 1166.726993][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1166.740066][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:43 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700034000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:42:43 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d4788005c0002"], 0x8c}}, 0x0) 06:42:43 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa50000000b000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1166.824154][ T1440] loop0: p1 < > p2 p3 p4 [ 1166.828548][ T1440] loop0: partition table partially beyond EOD, truncated [ 1166.835628][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1166.841774][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1166.851658][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1166.859343][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:44 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0006005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1166.873353][T31856] loop1: detected capacity change from 0 to 264192 [ 1166.884602][ T1440] loop0: p1 < > p2 p3 p4 [ 1166.888990][ T1440] loop0: partition table partially beyond EOD, truncated [ 1166.896078][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1166.902044][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1166.910841][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:42:44 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff070000000000006300080000000000fffe004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1166.918494][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1166.932331][ T1440] loop0: p1 < > p2 p3 p4 [ 1166.936788][ T1440] loop0: partition table partially beyond EOD, truncated [ 1166.943843][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1166.949837][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1166.957420][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1166.965097][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:44 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa506000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:44 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d4888005c0002"], 0x8c}}, 0x0) [ 1166.974553][T31861] loop4: detected capacity change from 0 to 264192 [ 1167.032156][T31865] loop5: detected capacity change from 0 to 264192 [ 1167.044027][ T1440] loop0: p1 < > p2 p3 p4 [ 1167.048455][ T1440] loop0: partition table partially beyond EOD, truncated [ 1167.055535][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1167.061558][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1167.073910][T31866] loop4: detected capacity change from 0 to 264192 06:42:44 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0007005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1167.074617][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1167.088368][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:44 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa50000000c000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:44 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff070000000000006300080000000000feff004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:44 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700004500000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1167.130573][T31876] loop1: detected capacity change from 0 to 264192 [ 1167.150717][ T1440] loop0: p1 < > p2 p3 p4 [ 1167.155196][ T1440] loop0: partition table partially beyond EOD, truncated [ 1167.162287][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1167.168276][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated 06:42:44 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d09c0005c0002"], 0x8c}}, 0x0) [ 1167.175838][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1167.183276][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1167.202635][ T1440] loop0: p1 < > p2 p3 p4 [ 1167.207016][ T1440] loop0: partition table partially beyond EOD, truncated [ 1167.214083][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1167.220100][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated 06:42:44 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa507000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1167.229851][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1167.237792][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1167.260749][ T1440] loop0: p1 < > p2 p3 p4 [ 1167.265180][ T1440] loop0: partition table partially beyond EOD, truncated [ 1167.272293][ T1440] loop0: p1 start 1 is beyond EOD, truncated 06:42:44 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0008005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1167.278268][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1167.285897][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1167.294439][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1167.304359][T31887] loop4: detected capacity change from 0 to 264192 [ 1167.314284][T31888] loop5: detected capacity change from 0 to 264192 [ 1167.352177][ T1440] loop0: p1 < > p2 p3 p4 [ 1167.356644][ T1440] loop0: partition table partially beyond EOD, truncated [ 1167.363746][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1167.369812][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1167.377350][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1167.384852][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:44 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff07000000000000630008000000000000000e4000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:44 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa50000000d000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1167.397090][T31890] loop4: detected capacity change from 0 to 264192 [ 1167.448975][ T1440] loop0: p1 < > p2 p3 p4 [ 1167.453442][ T1440] loop0: partition table partially beyond EOD, truncated [ 1167.460655][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1167.466756][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1167.476169][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1167.483828][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:44 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0002005c0002"], 0x8c}}, 0x0) 06:42:44 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700004600000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1167.501101][T31895] loop1: detected capacity change from 0 to 264192 [ 1167.566965][ T1440] loop0: p1 < > p2 p3 p4 [ 1167.571395][ T1440] loop0: partition table partially beyond EOD, truncated [ 1167.578462][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1167.584626][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1167.593016][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:42:44 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0009005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:44 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa508000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1167.615733][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:44 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff070000000000006300080000000000087ffe4000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1167.638355][T31905] loop5: detected capacity change from 0 to 264192 [ 1167.648350][ T1440] loop0: p1 < > p2 p3 p4 [ 1167.652757][ T1440] loop0: partition table partially beyond EOD, truncated [ 1167.660060][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1167.666101][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1167.674211][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1167.682086][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:44 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0003005c0002"], 0x8c}}, 0x0) 06:42:44 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa50000000e000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1167.723097][T31909] loop4: detected capacity change from 0 to 264192 [ 1167.779623][T31913] loop1: detected capacity change from 0 to 264192 [ 1167.788140][ T1440] loop0: p1 < > p2 p3 p4 [ 1167.792530][ T1440] loop0: partition table partially beyond EOD, truncated [ 1167.799779][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1167.805765][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1167.814198][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:42:45 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d000a005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:45 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff070000000000006300080000000000fffffdef00ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1167.824326][T31912] loop4: detected capacity change from 0 to 264192 [ 1167.830413][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:45 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0004005c0002"], 0x8c}}, 0x0) 06:42:45 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700004800000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:42:45 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa509000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1167.887309][T31925] loop5: detected capacity change from 0 to 264192 [ 1167.898012][ T1440] loop0: p1 < > p2 p3 p4 [ 1167.902371][ T1440] loop0: partition table partially beyond EOD, truncated [ 1167.909461][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1167.915515][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1167.923180][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1167.931081][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:45 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa50000000f000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1168.018605][ T1440] loop0: p1 < > p2 p3 p4 [ 1168.023006][ T1440] loop0: partition table partially beyond EOD, truncated [ 1168.030110][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1168.036099][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1168.044688][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1168.052456][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:45 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d000b005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1168.081851][T31935] loop1: detected capacity change from 0 to 264192 [ 1168.090770][ T1440] loop0: p1 < > p2 p3 p4 [ 1168.095142][ T1440] loop0: partition table partially beyond EOD, truncated [ 1168.102251][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1168.108260][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1168.111084][T31938] loop4: detected capacity change from 0 to 264192 [ 1168.116066][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1168.130022][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:45 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000002004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:45 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0005005c0002"], 0x8c}}, 0x0) 06:42:45 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa50a000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1168.153420][ T1440] loop0: p1 < > p2 p3 p4 [ 1168.157845][ T1440] loop0: partition table partially beyond EOD, truncated [ 1168.164987][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1168.170963][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1168.178636][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1168.186214][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1168.207002][T31941] loop4: detected capacity change from 0 to 264192 [ 1168.233695][T31943] loop5: detected capacity change from 0 to 264192 06:42:45 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d000c005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:45 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700004c00000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:42:45 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000010000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:45 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0006005c0002"], 0x8c}}, 0x0) 06:42:45 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000003004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1168.342361][ T1440] loop0: p1 < > p2 p3 p4 [ 1168.346756][ T1440] loop0: partition table partially beyond EOD, truncated [ 1168.353810][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1168.359833][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1168.367531][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1168.372530][T31955] loop1: detected capacity change from 0 to 264192 [ 1168.376760][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:45 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa50b000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1168.396804][ T1440] loop0: p1 < > p2 p3 p4 [ 1168.401128][ T1440] loop0: partition table partially beyond EOD, truncated [ 1168.408272][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1168.414242][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1168.422009][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1168.429586][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:45 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0007005c0002"], 0x8c}}, 0x0) 06:42:45 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d000d005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1168.481453][ T1440] loop0: p1 < > p2 p3 p4 [ 1168.485817][ T1440] loop0: partition table partially beyond EOD, truncated [ 1168.492857][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1168.498840][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1168.506781][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1168.514435][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1168.524519][T31964] loop5: detected capacity change from 0 to 264192 06:42:45 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000004004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1168.559752][ T1440] loop0: p1 < > p2 p3 p4 [ 1168.564156][ T1440] loop0: partition table partially beyond EOD, truncated [ 1168.571238][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1168.577229][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1168.585488][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1168.591282][T31969] loop4: detected capacity change from 0 to 264192 [ 1168.593636][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:45 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000011000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1168.649158][T31971] loop4: detected capacity change from 0 to 264192 [ 1168.674205][T31972] loop1: detected capacity change from 0 to 264192 06:42:45 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700024c00000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:42:45 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa50c000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:45 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0008005c0002"], 0x8c}}, 0x0) 06:42:45 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000005004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1168.786082][ T1440] loop0: p1 < > p2 p3 p4 [ 1168.790459][ T1440] loop0: partition table partially beyond EOD, truncated [ 1168.797707][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1168.803736][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1168.811272][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1168.819099][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:45 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d000e005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1168.836928][T31984] loop5: detected capacity change from 0 to 264192 [ 1168.869207][ T1440] loop0: p1 < > p2 p3 p4 [ 1168.873607][ T1440] loop0: partition table partially beyond EOD, truncated [ 1168.880845][ T1440] loop0: p1 start 1 is beyond EOD, truncated 06:42:46 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000012000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1168.886890][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1168.894406][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1168.901966][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1168.951517][ T1440] loop0: p1 < > p2 p3 p4 [ 1168.955914][ T1440] loop0: partition table partially beyond EOD, truncated [ 1168.962983][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1168.968971][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1168.977339][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1168.984856][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:46 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0009005c0002"], 0x8c}}, 0x0) [ 1169.006090][T31989] loop1: detected capacity change from 0 to 264192 [ 1169.019143][T31992] loop4: detected capacity change from 0 to 264192 [ 1169.031059][ T1440] loop0: p1 < > p2 p3 p4 [ 1169.035494][ T1440] loop0: partition table partially beyond EOD, truncated [ 1169.042546][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1169.048552][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated 06:42:46 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa50d000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1169.056181][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1169.064040][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1169.089808][ T1440] loop0: p1 < > p2 p3 p4 [ 1169.094164][ T1440] loop0: partition table partially beyond EOD, truncated 06:42:46 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000006004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:46 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d000f005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1169.101288][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1169.107288][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1169.115927][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1169.125882][T31995] loop4: detected capacity change from 0 to 264192 [ 1169.126349][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:46 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700025000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:42:46 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d000a005c0002"], 0x8c}}, 0x0) [ 1169.162351][T32001] loop5: detected capacity change from 0 to 264192 06:42:46 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000020000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:46 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000008004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1169.251253][T32009] loop1: detected capacity change from 0 to 264192 [ 1169.268582][ T1440] loop0: p1 < > p2 p3 p4 [ 1169.272919][ T1440] loop0: partition table partially beyond EOD, truncated [ 1169.280048][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1169.286080][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1169.294185][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1169.301938][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1169.320317][ T1440] loop0: p1 < > p2 p3 p4 [ 1169.324692][ T1440] loop0: partition table partially beyond EOD, truncated [ 1169.331814][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1169.337863][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated 06:42:46 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0010005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:46 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa50e000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:46 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d000b005c0002"], 0x8c}}, 0x0) [ 1169.351573][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1169.364522][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1169.403028][T32018] loop4: detected capacity change from 0 to 264192 [ 1169.404664][ T1440] loop0: p1 < > p2 p3 p4 [ 1169.414052][ T1440] loop0: partition table partially beyond EOD, truncated [ 1169.421184][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1169.427223][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1169.434974][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1169.442578][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1169.469461][T32021] loop4: detected capacity change from 0 to 264192 [ 1169.482198][T32022] loop5: detected capacity change from 0 to 264192 [ 1169.492012][ T1440] loop0: p1 < > p2 p3 p4 [ 1169.496369][ T1440] loop0: partition table partially beyond EOD, truncated [ 1169.503429][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1169.509425][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated 06:42:46 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff070000000000006300080000000000000a004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1169.519004][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1169.527158][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1169.548331][ T1440] loop0: p1 < > p2 p3 p4 [ 1169.552730][ T1440] loop0: partition table partially beyond EOD, truncated [ 1169.559868][ T1440] loop0: p1 start 1 is beyond EOD, truncated 06:42:46 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700005500000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:42:46 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000025000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:46 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d000c005c0002"], 0x8c}}, 0x0) 06:42:46 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0011005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1169.565886][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1169.573755][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1169.584231][T32027] loop1: detected capacity change from 0 to 264192 [ 1169.595529][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:46 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa50f000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1169.689274][ T1440] loop0: p1 < > p2 p3 p4 [ 1169.693629][ T1440] loop0: partition table partially beyond EOD, truncated [ 1169.700796][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1169.706794][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1169.714311][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1169.722388][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1169.771329][ T1440] loop0: p1 < > p2 p3 p4 [ 1169.775781][ T1440] loop0: partition table partially beyond EOD, truncated [ 1169.782812][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1169.788798][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1169.796558][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1169.803975][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1169.809525][T32040] loop5: detected capacity change from 0 to 264192 06:42:46 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff070000000000006300080000000000000b004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1169.822492][ T1440] loop0: p1 < > p2 p3 p4 [ 1169.826906][ T1440] loop0: partition table partially beyond EOD, truncated [ 1169.833904][T32041] __nla_validate_parse: 52 callbacks suppressed [ 1169.833918][T32041] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1169.833959][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1169.851810][T32042] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1169.855712][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1169.856446][ T1440] loop0: p3 size 1912633224 extends beyond EOD, [ 1169.867853][T32044] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1169.872154][ T1440] truncated [ 1169.873435][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1169.891447][T32045] loop4: detected capacity change from 0 to 264192 06:42:47 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d000d005c0002"], 0x8c}}, 0x0) 06:42:47 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa50000003f000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:47 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0012005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1169.926266][T32048] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1169.959764][T32050] loop1: detected capacity change from 0 to 264192 06:42:47 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000018004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1169.975237][ T1440] loop0: p1 < > p2 p3 p4 [ 1169.979251][T32049] loop4: detected capacity change from 0 to 264192 [ 1169.979576][ T1440] loop0: partition table partially beyond EOD, truncated [ 1169.993162][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1169.999229][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1170.007151][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1170.015057][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:47 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700015900000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:42:47 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa510000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1170.088881][ T1440] loop0: p1 < > p2 p3 p4 [ 1170.093211][ T1440] loop0: partition table partially beyond EOD, truncated [ 1170.099331][T32056] loop5: detected capacity change from 0 to 264192 [ 1170.100361][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1170.107379][T32057] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1170.112691][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1170.130033][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:42:47 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d000e005c0002"], 0x8c}}, 0x0) [ 1170.138460][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1170.155673][ T1440] loop0: p1 < > p2 p3 p4 [ 1170.160043][ T1440] loop0: partition table partially beyond EOD, truncated [ 1170.160633][T32059] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1170.167163][ T1440] loop0: p1 start 1 is beyond EOD, truncated 06:42:47 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000040000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:47 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0025005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1170.182423][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1170.190629][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1170.199212][T32063] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1170.210745][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:47 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000026004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1170.262103][T32067] loop1: detected capacity change from 0 to 264192 [ 1170.286302][ T1440] loop0: p1 < > p2 p3 p4 [ 1170.290696][ T1440] loop0: partition table partially beyond EOD, truncated [ 1170.297876][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1170.303948][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1170.311706][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1170.319210][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:47 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa511000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1170.355388][T32072] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1170.368391][T32070] loop4: detected capacity change from 0 to 264192 06:42:47 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d000f005c0002"], 0x8c}}, 0x0) [ 1170.404851][T32075] loop5: detected capacity change from 0 to 264192 [ 1170.438985][T32076] loop4: detected capacity change from 0 to 264192 [ 1170.440397][ T1440] loop0: p1 < > p2 p3 p4 [ 1170.446384][T32077] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1170.449942][ T1440] loop0: partition table partially beyond EOD, truncated [ 1170.466364][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1170.472338][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1170.479903][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1170.487828][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:47 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d002c005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:47 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500080040000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:47 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700015c00000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1170.497549][T32081] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1170.558319][ T1440] loop0: p1 < > p2 p3 p4 [ 1170.562696][ T1440] loop0: partition table partially beyond EOD, truncated [ 1170.569805][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1170.575817][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1170.585590][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1170.593207][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:47 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000073004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1170.609538][ T1440] loop0: p1 < > p2 p3 p4 [ 1170.613884][ T1440] loop0: partition table partially beyond EOD, truncated [ 1170.621063][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1170.627073][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1170.634770][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1170.642306][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:47 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0010005c0002"], 0x8c}}, 0x0) [ 1170.706123][T32085] loop1: detected capacity change from 0 to 264192 06:42:47 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa512000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1170.761762][ T1440] loop0: p1 < > p2 p3 p4 [ 1170.766230][ T1440] loop0: partition table partially beyond EOD, truncated [ 1170.773586][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1170.779576][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1170.787353][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1170.796604][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:47 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0048005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1170.811839][T32092] loop4: detected capacity change from 0 to 264192 [ 1170.824753][T32096] loop5: detected capacity change from 0 to 264192 [ 1170.842742][ T1440] loop0: p1 < > p2 p3 p4 [ 1170.847126][ T1440] loop0: partition table partially beyond EOD, truncated [ 1170.854282][ T1440] loop0: p1 start 1 is beyond EOD, truncated 06:42:48 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000083004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1170.860270][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1170.869198][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1170.876785][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1170.892507][ T1440] loop0: p1 < > p2 p3 p4 [ 1170.896885][ T1440] loop0: partition table partially beyond EOD, truncated [ 1170.903929][ T1440] loop0: p1 start 1 is beyond EOD, truncated 06:42:48 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000048000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:48 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700006000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1170.909992][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1170.917749][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1170.926501][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1170.928658][T32100] loop4: detected capacity change from 0 to 264192 06:42:48 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0011005c0002"], 0x8c}}, 0x0) [ 1171.031977][T32107] loop1: detected capacity change from 0 to 264192 [ 1171.064363][ T1440] loop0: p1 < > p2 p3 p4 [ 1171.068790][ T1440] loop0: partition table partially beyond EOD, truncated [ 1171.075954][ T1440] loop0: p1 start 1 is beyond EOD, truncated 06:42:48 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d004c005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:48 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff07000000000000630008000000000000fe004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1171.081936][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1171.091140][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1171.098715][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1171.120191][ T1440] loop0: p1 < > p2 p3 p4 [ 1171.124585][ T1440] loop0: partition table partially beyond EOD, truncated 06:42:48 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa525000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1171.131704][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1171.137741][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1171.145743][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1171.153298][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1171.164041][T32115] loop5: detected capacity change from 0 to 264192 [ 1171.171720][ T1440] loop0: p1 < > p2 p3 p4 [ 1171.176063][ T1440] loop0: partition table partially beyond EOD, truncated [ 1171.183306][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1171.189324][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1171.196900][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1171.204626][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:48 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0012005c0002"], 0x8c}}, 0x0) 06:42:48 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa50000004c000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1171.240326][T32117] loop4: detected capacity change from 0 to 264192 [ 1171.323790][ T1440] loop0: p1 < > p2 p3 p4 [ 1171.328199][ T1440] loop0: partition table partially beyond EOD, truncated [ 1171.335284][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1171.341256][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1171.350804][T32124] loop1: detected capacity change from 0 to 264192 [ 1171.351833][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1171.367157][T32120] loop4: detected capacity change from 0 to 264192 06:42:48 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000004024000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:48 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0058005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1171.370978][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:48 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa548000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:48 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700026000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:42:48 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0025005c0002"], 0x8c}}, 0x0) [ 1171.439001][ T1440] loop0: p1 < > p2 p3 p4 [ 1171.443497][ T1440] loop0: partition table partially beyond EOD, truncated [ 1171.450738][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1171.456750][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1171.464469][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1171.472055][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1171.508478][T32134] loop5: detected capacity change from 0 to 264192 06:42:48 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000068000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1171.566501][ T1440] loop0: p1 < > p2 p3 p4 [ 1171.570912][ T1440] loop0: partition table partially beyond EOD, truncated [ 1171.578076][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1171.584113][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1171.593891][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1171.602436][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:48 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0060005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1171.644519][T32146] loop1: detected capacity change from 0 to 264192 [ 1171.657491][ T1440] loop0: p1 < > p2 p3 p4 [ 1171.657979][T32147] loop4: detected capacity change from 0 to 264192 [ 1171.661872][ T1440] loop0: partition table partially beyond EOD, truncated [ 1171.675482][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1171.681453][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated 06:42:48 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0048005c0002"], 0x8c}}, 0x0) 06:42:48 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000034000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:48 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa54c000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1171.689225][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1171.697676][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1171.732849][ T1440] loop0: p1 < > p2 p3 p4 [ 1171.737235][ T1440] loop0: partition table partially beyond EOD, truncated [ 1171.741546][T32150] loop4: detected capacity change from 0 to 264192 [ 1171.744289][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1171.756829][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1171.764959][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1171.772773][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:48 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700006800000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1171.848007][T32153] loop5: detected capacity change from 0 to 264192 [ 1171.889730][ T1440] loop0: p1 < > p2 p3 p4 [ 1171.894176][ T1440] loop0: partition table partially beyond EOD, truncated [ 1171.901349][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1171.907356][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1171.914358][T32162] loop1: detected capacity change from 0 to 264192 [ 1171.916553][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:42:49 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d004c005c0002"], 0x8c}}, 0x0) 06:42:49 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0068005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:49 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa50000006c000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1171.942085][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1171.972305][ T1440] loop0: p1 < > p2 p3 p4 [ 1171.976702][ T1440] loop0: partition table partially beyond EOD, truncated [ 1171.979316][T32166] loop4: detected capacity change from 0 to 264192 06:42:49 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000080034000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:49 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa568000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1171.983799][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1171.996466][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1172.003986][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1172.011828][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1172.058941][T32167] loop4: detected capacity change from 0 to 264192 [ 1172.106852][ T1440] loop0: p1 < > p2 p3 p4 [ 1172.111204][ T1440] loop0: partition table partially beyond EOD, truncated [ 1172.118288][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1172.124329][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1172.133452][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1172.142172][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:49 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700036800000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:42:49 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0058005c0002"], 0x8c}}, 0x0) 06:42:49 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000002044000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1172.153986][T32177] loop5: detected capacity change from 0 to 264192 06:42:49 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d006c005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1172.198457][T32181] loop1: detected capacity change from 0 to 264192 [ 1172.221304][ T1440] loop0: p1 < > p2 p3 p4 [ 1172.225711][ T1440] loop0: partition table partially beyond EOD, truncated [ 1172.232845][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1172.238837][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated 06:42:49 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000074000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1172.246392][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1172.254739][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1172.288554][T32185] loop4: detected capacity change from 0 to 264192 06:42:49 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa56c000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1172.293898][ T1440] loop0: p1 < > p2 p3 p4 [ 1172.299485][ T1440] loop0: partition table partially beyond EOD, truncated [ 1172.306564][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1172.312642][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1172.320908][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1172.328519][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:49 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000006044000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:49 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0060005c0002"], 0x8c}}, 0x0) 06:42:49 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0074005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1172.360929][ T1440] loop0: p1 < > p2 p3 p4 [ 1172.365311][ T1440] loop0: partition table partially beyond EOD, truncated [ 1172.372484][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1172.378462][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1172.386281][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1172.396849][T32187] loop4: detected capacity change from 0 to 264192 [ 1172.403649][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:49 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700006c00000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1172.470779][T32196] loop5: detected capacity change from 0 to 264192 [ 1172.498071][ T1440] loop0: p1 < > p2 p3 p4 [ 1172.502433][ T1440] loop0: partition table partially beyond EOD, truncated [ 1172.509668][ T1440] loop0: p1 start 1 is beyond EOD, truncated 06:42:49 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0068005c0002"], 0x8c}}, 0x0) 06:42:49 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000054000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1172.515713][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1172.523283][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1172.533882][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1172.539691][T32202] loop1: detected capacity change from 0 to 264192 [ 1172.566101][ T1440] loop0: p1 < > p2 p3 p4 06:42:49 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa50000007a000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1172.570504][ T1440] loop0: partition table partially beyond EOD, truncated [ 1172.577573][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1172.583585][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1172.591446][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1172.599855][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1172.615994][ T1440] loop0: p1 < > p2 p3 p4 06:42:49 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa574000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:49 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d007a005c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1172.620326][ T1440] loop0: partition table partially beyond EOD, truncated [ 1172.627492][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1172.633564][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1172.641208][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1172.650781][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1172.723713][T32211] loop4: detected capacity change from 0 to 264192 [ 1172.789976][T32212] loop4: detected capacity change from 0 to 264192 [ 1172.798062][ T1440] loop0: p1 < > p2 p3 p4 [ 1172.802655][ T1440] loop0: partition table partially beyond EOD, truncated [ 1172.809785][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1172.815842][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1172.823453][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1172.831184][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:50 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700036c00000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:42:50 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000064000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:50 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d006c005c0002"], 0x8c}}, 0x0) [ 1172.844781][T32218] loop5: detected capacity change from 0 to 264192 [ 1172.871660][T32222] loop1: detected capacity change from 0 to 264192 [ 1172.887828][ T1440] loop0: p1 < > p2 p3 p4 06:42:50 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa57a000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:50 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5ffffff80000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:50 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00b2025c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1172.892302][ T1440] loop0: partition table partially beyond EOD, truncated [ 1172.899451][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1172.905519][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1172.913176][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1172.921390][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1172.990550][ T1440] loop0: p1 < > p2 p3 p4 [ 1172.994937][ T1440] loop0: partition table partially beyond EOD, truncated [ 1173.002006][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1173.008029][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1173.016050][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1173.023714][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1173.059167][ T1440] loop0: p1 < > p2 p3 p4 [ 1173.063521][ T1440] loop0: partition table partially beyond EOD, truncated [ 1173.063626][T32231] loop4: detected capacity change from 0 to 264192 [ 1173.070754][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1173.083205][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1173.091143][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:42:50 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0074005c0002"], 0x8c}}, 0x0) 06:42:50 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000004064000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1173.105000][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1173.134237][ T1440] loop0: p1 < > p2 p3 p4 [ 1173.138817][ T1440] loop0: partition table partially beyond EOD, truncated [ 1173.145958][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1173.151957][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1173.160293][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1173.163473][T32237] loop4: detected capacity change from 0 to 264192 [ 1173.168093][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:50 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000035c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:50 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700037000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1173.186108][T32238] loop5: detected capacity change from 0 to 264192 [ 1173.200933][T32242] loop1: detected capacity change from 0 to 264192 06:42:50 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa50000059f000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:50 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa590000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:50 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d007a005c0002"], 0x8c}}, 0x0) [ 1173.303486][ T1440] loop0: p1 < > p2 p3 p4 [ 1173.307904][ T1440] loop0: partition table partially beyond EOD, truncated [ 1173.315023][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1173.320996][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1173.328548][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1173.337237][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:50 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff07000000000000630008000000000000000a4000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1173.356231][ T1440] loop0: p1 < > p2 p3 p4 [ 1173.360582][ T1440] loop0: partition table partially beyond EOD, truncated [ 1173.367743][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1173.373742][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1173.381555][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1173.390199][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:50 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000055c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1173.405733][ T1440] loop0: p1 < > p2 p3 p4 [ 1173.410091][ T1440] loop0: partition table partially beyond EOD, truncated [ 1173.417169][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1173.423137][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1173.437329][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1173.445284][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1173.451984][T32256] loop4: detected capacity change from 0 to 264192 [ 1173.501137][T32259] loop5: detected capacity change from 0 to 264192 [ 1173.516357][ T1440] loop0: p1 < > p2 p3 p4 [ 1173.520754][ T1440] loop0: partition table partially beyond EOD, truncated [ 1173.527879][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1173.533852][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1173.541473][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:42:50 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000035c0002"], 0x8c}}, 0x0) 06:42:50 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700007400000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:42:50 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5000005c5000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:50 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff07000000000000630008000000000000000b4000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1173.551522][T32260] loop4: detected capacity change from 0 to 264192 [ 1173.551702][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1173.576170][T32264] loop1: detected capacity change from 0 to 264192 06:42:50 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5fe000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1173.632659][ T1440] loop0: p1 < > p2 p3 p4 [ 1173.637068][ T1440] loop0: partition table partially beyond EOD, truncated [ 1173.644277][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1173.650291][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1173.658302][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1173.666873][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:50 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000065c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:50 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000055c0002"], 0x8c}}, 0x0) [ 1173.752968][ T1440] loop0: p1 < > p2 p3 p4 [ 1173.757352][ T1440] loop0: partition table partially beyond EOD, truncated [ 1173.764436][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1173.770411][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1173.778139][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1173.786013][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1173.826455][T32279] loop4: detected capacity change from 0 to 264192 [ 1173.827521][T32281] loop5: detected capacity change from 0 to 264192 [ 1173.840666][ T1440] loop0: p1 < > p2 p3 p4 [ 1173.845054][ T1440] loop0: partition table partially beyond EOD, truncated [ 1173.852115][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1173.858178][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1173.867336][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:42:51 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000184000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1173.873629][T32282] loop1: detected capacity change from 0 to 264192 [ 1173.875486][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1173.898184][ T1440] loop0: p1 < > p2 p3 p4 [ 1173.902532][ T1440] loop0: partition table partially beyond EOD, truncated [ 1173.909629][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1173.915649][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated 06:42:51 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5ffffffc9000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1173.923164][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1173.930702][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1173.945363][T32283] loop4: detected capacity change from 0 to 264192 06:42:51 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa504020000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:51 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000075c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:51 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000065c0002"], 0x8c}}, 0x0) 06:42:51 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700037400000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:42:51 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000204000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1174.038340][ T1440] loop0: p1 < > p2 p3 p4 [ 1174.042705][ T1440] loop0: partition table partially beyond EOD, truncated [ 1174.049892][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1174.055892][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1174.063556][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1174.072168][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1174.083341][T32297] loop5: detected capacity change from 0 to 264192 06:42:51 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000075c0002"], 0x8c}}, 0x0) [ 1174.111032][T32299] loop1: detected capacity change from 0 to 264192 [ 1174.131909][ T1440] loop0: p1 < > p2 p3 p4 [ 1174.136275][ T1440] loop0: partition table partially beyond EOD, truncated [ 1174.143339][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1174.149429][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated 06:42:51 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000095c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:51 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5fffffff6000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1174.151844][T32305] loop4: detected capacity change from 0 to 264192 [ 1174.157976][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1174.170927][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:51 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000264000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:51 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000095c0002"], 0x8c}}, 0x0) 06:42:51 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500030000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1174.234620][T32310] loop4: detected capacity change from 0 to 264192 [ 1174.251428][ T1440] loop0: p1 < > p2 p3 p4 [ 1174.255880][ T1440] loop0: partition table partially beyond EOD, truncated [ 1174.263068][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1174.269962][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1174.277526][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1174.285812][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1174.301301][ T1440] loop0: p1 < > p2 p3 p4 [ 1174.305654][ T1440] loop0: partition table partially beyond EOD, truncated [ 1174.312809][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1174.318868][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated 06:42:51 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700007800000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:42:51 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00000a5c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1174.330238][T32319] loop5: detected capacity change from 0 to 264192 [ 1174.332296][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1174.346453][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:51 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5000407f8000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:51 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff07000000000000630008000000000000003f4000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:51 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00c0095c0002"], 0x8c}}, 0x0) [ 1174.429876][T32327] loop1: detected capacity change from 0 to 264192 [ 1174.451652][ T1440] loop0: p1 < > p2 p3 p4 [ 1174.456039][ T1440] loop0: partition table partially beyond EOD, truncated [ 1174.463101][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1174.469115][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1174.476688][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1174.484330][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1174.501378][ T1440] loop0: p1 < > p2 p3 p4 [ 1174.505836][ T1440] loop0: partition table partially beyond EOD, truncated [ 1174.512971][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1174.518972][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1174.526902][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1174.534291][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1174.544648][T32335] loop4: detected capacity change from 0 to 264192 [ 1174.560516][ T1440] loop0: p1 < > p2 p3 p4 [ 1174.564941][ T1440] loop0: partition table partially beyond EOD, truncated [ 1174.572237][ T1440] loop0: p1 start 1 is beyond EOD, truncated 06:42:51 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00000b5c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:51 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa502040000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:51 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00000a5c0002"], 0x8c}}, 0x0) 06:42:51 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000404000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1174.578236][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1174.582732][T32341] loop5: detected capacity change from 0 to 264192 [ 1174.592014][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1174.600097][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:51 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5fffffdfd000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1174.653261][T32342] loop4: detected capacity change from 0 to 264192 [ 1174.661315][ T1440] loop0: p1 < > p2 p3 p4 [ 1174.665686][ T1440] loop0: partition table partially beyond EOD, truncated [ 1174.672760][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1174.678805][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1174.686949][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1174.695063][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:51 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700007a00000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1174.709608][ T1440] loop0: p1 < > p2 p3 p4 [ 1174.714072][ T1440] loop0: partition table partially beyond EOD, truncated [ 1174.721194][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1174.727167][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1174.738371][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1174.746223][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:51 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00000c5c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1174.791407][T32353] loop1: detected capacity change from 0 to 264192 06:42:51 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000734000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:51 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00000b5c0002"], 0x8c}}, 0x0) [ 1174.842064][ T1440] loop0: p1 < > p2 p3 p4 [ 1174.846545][ T1440] loop0: partition table partially beyond EOD, truncated [ 1174.853635][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1174.859627][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1174.867452][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1174.869928][T32360] loop5: detected capacity change from 0 to 264192 [ 1174.876170][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:52 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa506040000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:52 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5fffffffe000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1174.899940][ T1440] loop0: p1 < > p2 p3 p4 [ 1174.904316][ T1440] loop0: partition table partially beyond EOD, truncated [ 1174.911427][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1174.917419][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1174.925669][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1174.933303][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1174.976277][ T1440] loop0: p1 < > p2 p3 p4 [ 1174.980641][ T1440] loop0: partition table partially beyond EOD, truncated [ 1174.983296][T32365] __nla_validate_parse: 63 callbacks suppressed [ 1174.983310][T32365] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1174.987809][ T1440] loop0: p1 start 1 is beyond EOD, [ 1175.003051][T32367] loop4: detected capacity change from 0 to 264192 [ 1175.003242][ T1440] truncated [ 1175.018087][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated 06:42:52 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00000c5c0002"], 0x8c}}, 0x0) 06:42:52 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00000d5c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1175.023817][T32369] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1175.026501][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1175.047302][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1175.047599][T32372] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. 06:42:52 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000003804000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1175.085434][ T1440] loop0: p1 < > p2 p3 p4 [ 1175.089846][ T1440] loop0: partition table partially beyond EOD, truncated [ 1175.096960][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1175.102936][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1175.110662][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1175.120853][T32374] loop4: detected capacity change from 0 to 264192 [ 1175.121039][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:52 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700027c00000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1175.153341][T32377] loop1: detected capacity change from 0 to 264192 [ 1175.181708][T32378] loop5: detected capacity change from 0 to 264192 06:42:52 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500050000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1175.211895][ T1440] loop0: p1 < > p2 p3 p4 [ 1175.216352][ T1440] loop0: partition table partially beyond EOD, truncated [ 1175.223448][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1175.229645][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1175.237907][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1175.245786][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:52 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5000407ff000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1175.274243][T32384] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1175.288657][T32382] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1175.303478][T32386] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. 06:42:52 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00000e5c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:52 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00000d5c0002"], 0x8c}}, 0x0) 06:42:52 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000834000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1175.317195][T32388] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1175.327067][ T1440] loop0: p1 < > p2 p3 p4 [ 1175.331418][ T1440] loop0: partition table partially beyond EOD, truncated [ 1175.338548][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1175.344521][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1175.352146][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1175.361008][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1175.389076][ T1440] loop0: p1 < > p2 p3 p4 [ 1175.393427][ T1440] loop0: partition table partially beyond EOD, truncated [ 1175.400569][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1175.406555][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1175.414064][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1175.419323][T32391] loop4: detected capacity change from 0 to 264192 [ 1175.422028][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1175.469159][T32395] loop1: detected capacity change from 0 to 264192 [ 1175.500999][T32396] loop4: detected capacity change from 0 to 264192 [ 1175.508000][T32397] loop5: detected capacity change from 0 to 264192 [ 1175.515437][T32398] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1175.529197][ T1440] loop0: p1 < > p2 p3 p4 [ 1175.533337][T32399] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1175.533631][ T1440] loop0: partition table partially beyond EOD, truncated [ 1175.550028][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1175.556023][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated 06:42:52 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00000e5c0002"], 0x8c}}, 0x0) 06:42:52 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa59f050000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:52 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700038000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:42:52 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00000f5c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:52 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000fff000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:52 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff07000000000000630008000000000000fdef4000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1175.567397][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1175.579869][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1175.596591][T32404] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1175.668853][ T1440] loop0: p1 < > p2 p3 p4 [ 1175.673190][ T1440] loop0: partition table partially beyond EOD, truncated [ 1175.680452][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1175.686502][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1175.694119][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1175.701812][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1175.717648][ T1440] loop0: p1 < > p2 p3 p4 [ 1175.722114][ T1440] loop0: partition table partially beyond EOD, truncated [ 1175.729271][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1175.735408][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1175.743256][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1175.750862][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:52 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00000f5c0002"], 0x8c}}, 0x0) [ 1175.847989][ T1440] loop0: p1 < > p2 p3 p4 [ 1175.852462][ T1440] loop0: partition table partially beyond EOD, truncated [ 1175.859657][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1175.865658][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1175.873319][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1175.879395][T32414] loop1: detected capacity change from 0 to 264192 [ 1175.880778][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1175.894508][T32415] loop5: detected capacity change from 0 to 264192 [ 1175.909366][T32416] loop4: detected capacity change from 0 to 264192 [ 1175.924120][ T1440] loop0: p1 < > p2 p3 p4 [ 1175.928495][ T1440] loop0: partition table partially beyond EOD, truncated [ 1175.935703][ T1440] loop0: p1 start 1 is beyond EOD, truncated 06:42:53 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000115c0002"], 0x8c}}, 0x0) 06:42:53 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5c5050000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1175.941735][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1175.950281][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1175.950642][T32416] loop4: p1 < > p2 p3 p4 [ 1175.968691][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1175.975756][T32416] loop4: p2 size 1073741824 extends beyond EOD, truncated 06:42:53 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5ffffefff000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:53 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff07000000000000630008000000000000effd4000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:53 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000115c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1175.992817][T32416] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1176.016752][ T1440] loop0: p1 < > p2 p3 p4 [ 1176.021204][ T1440] loop0: partition table partially beyond EOD, truncated [ 1176.028290][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1176.034329][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1176.041975][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1176.050495][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1176.056635][T32424] loop4: detected capacity change from 0 to 264192 [ 1176.095155][ T1440] loop4: p1 < > p2 p3 p4 [ 1176.099994][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1176.107598][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1176.117882][ T1440] loop4: p1 < > p2 p3 p4 [ 1176.122809][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1176.130243][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1176.139615][T32424] loop4: p1 < > p2 p3 p4 06:42:53 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700008100000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1176.144339][T32424] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1176.152518][T32424] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:42:53 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000125c0002"], 0x8c}}, 0x0) 06:42:53 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff07000000000000630008000000000000fffe4000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:53 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000125c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1176.212844][T32435] loop1: detected capacity change from 0 to 264192 [ 1176.228042][T32438] loop5: detected capacity change from 0 to 264192 [ 1176.239862][ T1440] loop4: p1 < > p2 p3 p4 [ 1176.244778][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1176.254464][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:42:53 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500060000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:53 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5ffefffff000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:53 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000205c0002"], 0x8c}}, 0x0) [ 1176.327094][ T1440] loop0: p1 < > p2 p3 p4 [ 1176.331444][ T1440] loop0: partition table partially beyond EOD, truncated [ 1176.338604][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1176.344722][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1176.352386][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1176.360933][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1176.381463][ T1440] loop0: p1 < > p2 p3 p4 [ 1176.383361][T32448] loop4: detected capacity change from 0 to 264192 [ 1176.385874][ T1440] loop0: partition table partially beyond EOD, truncated [ 1176.399452][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1176.405440][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1176.417000][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1176.426289][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:53 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff07000000000000630008000000000000feff4000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:53 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000205c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:53 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000255c0002"], 0x8c}}, 0x0) [ 1176.458044][T32457] loop1: detected capacity change from 0 to 264192 [ 1176.468309][T32453] loop4: detected capacity change from 0 to 264192 [ 1176.488791][T32460] loop5: detected capacity change from 0 to 264192 06:42:53 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700038400000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1176.531406][ T1440] loop0: p1 < > p2 p3 p4 [ 1176.535866][ T1440] loop0: partition table partially beyond EOD, truncated [ 1176.543005][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1176.549208][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1176.556714][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1176.564417][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:53 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa504060000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:53 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5fdfdffff000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1176.597003][ T1440] loop0: p1 < > p2 p3 p4 [ 1176.601371][ T1440] loop0: partition table partially beyond EOD, truncated [ 1176.608442][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1176.614496][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1176.623274][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1176.630948][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1176.649420][ T1440] loop0: p1 < > p2 p3 p4 [ 1176.653800][ T1440] loop0: partition table partially beyond EOD, truncated [ 1176.661005][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1176.666989][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1176.674589][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1176.682113][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:53 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000405c0002"], 0x8c}}, 0x0) 06:42:53 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000255c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:53 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000020000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1176.753580][ T1440] loop0: p1 < > p2 p3 p4 [ 1176.757965][ T1440] loop0: partition table partially beyond EOD, truncated [ 1176.765246][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1176.771345][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1176.778881][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1176.787439][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1176.873608][T32475] loop5: detected capacity change from 0 to 264192 [ 1176.882979][T32476] loop1: detected capacity change from 0 to 264192 [ 1176.903959][T32477] loop4: detected capacity change from 0 to 264192 06:42:54 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0088475c0002"], 0x8c}}, 0x0) [ 1176.922994][ T1440] loop0: p1 < > p2 p3 p4 [ 1176.927369][ T1440] loop0: partition table partially beyond EOD, truncated [ 1176.934493][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1176.940483][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1176.950513][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1176.958611][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:54 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa580ffffff000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:54 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000100000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:54 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500070000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:54 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00002c5c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1176.980200][T32484] loop4: detected capacity change from 0 to 264192 06:42:54 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700009000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:42:54 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000485c0002"], 0x8c}}, 0x0) [ 1177.029867][ T1440] loop0: p1 < > p2 p3 p4 [ 1177.034201][ T1440] loop0: partition table partially beyond EOD, truncated [ 1177.041268][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1177.047282][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1177.054882][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1177.062838][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1177.153468][ T1440] loop0: p1 < > p2 p3 p4 [ 1177.157905][ T1440] loop0: partition table partially beyond EOD, truncated [ 1177.165097][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1177.166367][T32496] loop5: detected capacity change from 0 to 264192 [ 1177.171071][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1177.171741][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1177.192239][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:54 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000024000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1177.201389][T32497] loop1: detected capacity change from 0 to 264192 [ 1177.238563][ T1440] loop0: p1 < > p2 p3 p4 [ 1177.242926][ T1440] loop0: partition table partially beyond EOD, truncated [ 1177.250030][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1177.256017][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated 06:42:54 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5c9ffffff000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1177.291704][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1177.309441][T32505] loop4: detected capacity change from 0 to 264192 06:42:54 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0088475c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:54 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500090000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:54 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0088485c0002"], 0x8c}}, 0x0) [ 1177.336420][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:54 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000034000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1177.409509][T32509] loop4: detected capacity change from 0 to 264192 [ 1177.422632][ T1440] loop0: p1 < > p2 p3 p4 [ 1177.427007][ T1440] loop0: partition table partially beyond EOD, truncated [ 1177.434146][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1177.440160][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1177.466283][T32518] loop1: detected capacity change from 0 to 264192 [ 1177.484865][T32520] loop5: detected capacity change from 0 to 264192 06:42:54 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700009200000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:42:54 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00004c5c0002"], 0x8c}}, 0x0) 06:42:54 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000485c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1177.518814][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1177.535176][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:54 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5000a0000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1177.574641][ T1440] loop0: p1 < > p2 p3 p4 [ 1177.579043][ T1440] loop0: partition table partially beyond EOD, truncated [ 1177.586275][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1177.592251][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1177.602269][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1177.610736][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:54 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5f6ffffff000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:54 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000044000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1177.639580][T32527] loop4: detected capacity change from 0 to 264192 [ 1177.664871][ T1440] loop0: p1 < > p2 p3 p4 [ 1177.669337][ T1440] loop0: partition table partially beyond EOD, truncated [ 1177.676480][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1177.682459][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1177.717218][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1177.732303][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1177.744646][T32528] loop4: detected capacity change from 0 to 264192 06:42:54 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700019800000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:42:54 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000585c0002"], 0x8c}}, 0x0) [ 1177.833874][ T1440] loop0: p1 < > p2 p3 p4 [ 1177.838043][T32538] loop5: detected capacity change from 0 to 264192 [ 1177.838379][ T1440] loop0: partition table partially beyond EOD, truncated [ 1177.851949][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1177.858000][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1177.871403][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:42:55 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0088485c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1177.873580][T32541] loop1: detected capacity change from 0 to 264192 [ 1177.896639][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:55 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000054000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1177.972205][T32547] loop4: detected capacity change from 0 to 264192 [ 1178.007263][ T1440] loop0: p1 < > p2 p3 p4 [ 1178.011711][ T1440] loop0: partition table partially beyond EOD, truncated 06:42:55 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5000b0000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:55 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0065585c0002"], 0x8c}}, 0x0) 06:42:55 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5feffffff000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1178.018833][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1178.024822][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1178.037046][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1178.045686][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1178.063791][ T1440] loop0: p1 < > p2 p3 p4 06:42:55 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00004c5c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1178.068287][ T1440] loop0: partition table partially beyond EOD, truncated [ 1178.075371][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1178.081432][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1178.090650][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1178.098623][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1178.102489][T32549] loop4: detected capacity change from 0 to 264192 06:42:55 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000064000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:55 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700059f00000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1178.207081][ T1440] loop0: p1 < > p2 p3 p4 [ 1178.211632][ T1440] loop0: partition table partially beyond EOD, truncated [ 1178.218809][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1178.224783][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1178.234664][T32559] loop1: detected capacity change from 0 to 264192 [ 1178.234874][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1178.249498][T32562] loop5: detected capacity change from 0 to 264192 06:42:55 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000605c0002"], 0x8c}}, 0x0) [ 1178.250545][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1178.282125][ T1440] loop0: p1 < > p2 p3 p4 [ 1178.286638][ T1440] loop0: partition table partially beyond EOD, truncated [ 1178.293868][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1178.299855][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated 06:42:55 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000585c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1178.307572][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1178.315455][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:55 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5000c0000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:55 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500020000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1178.355120][ T1440] loop0: p1 < > p2 p3 p4 [ 1178.359546][ T1440] loop0: partition table partially beyond EOD, truncated [ 1178.366654][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1178.372624][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1178.380575][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1178.385033][T32570] loop4: detected capacity change from 0 to 264192 [ 1178.391987][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:55 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000084000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1178.410358][ T1440] loop0: p1 < > p2 p3 p4 [ 1178.414697][ T1440] loop0: partition table partially beyond EOD, truncated [ 1178.421973][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1178.427998][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1178.435612][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1178.442987][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1178.457156][ T1440] loop0: p1 < > p2 p3 p4 [ 1178.461485][ T1440] loop0: partition table partially beyond EOD, truncated [ 1178.468589][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1178.474568][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1178.482322][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1178.492305][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1178.492657][T32572] loop4: detected capacity change from 0 to 264192 06:42:55 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff070003a200000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:42:55 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0058655c0002"], 0x8c}}, 0x0) 06:42:55 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0065585c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:55 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff07000000000000630008000000000000000a4000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1178.590705][T32584] loop5: detected capacity change from 0 to 264192 [ 1178.592693][T32583] loop1: detected capacity change from 0 to 264192 [ 1178.620546][ T1440] loop0: p1 < > p2 p3 p4 [ 1178.624915][ T1440] loop0: partition table partially beyond EOD, truncated [ 1178.632025][ T1440] loop0: p1 start 1 is beyond EOD, truncated 06:42:55 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5000d0000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1178.638144][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1178.645635][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1178.653193][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1178.679525][ T1440] loop0: p1 < > p2 p3 p4 [ 1178.683865][ T1440] loop0: partition table partially beyond EOD, truncated 06:42:55 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500030000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1178.691030][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1178.697051][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1178.706044][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1178.714194][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:55 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000685c0002"], 0x8c}}, 0x0) [ 1178.739639][T32591] loop4: detected capacity change from 0 to 264192 [ 1178.748668][ T1440] loop0: p1 < > p2 p3 p4 [ 1178.753028][ T1440] loop0: partition table partially beyond EOD, truncated [ 1178.760279][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1178.766280][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1178.773995][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1178.782415][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:55 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000605c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1178.803631][ T1440] loop0: p1 < > p2 p3 p4 [ 1178.808019][ T1440] loop0: partition table partially beyond EOD, truncated [ 1178.815374][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1178.821356][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1178.828945][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1178.834695][T32599] loop4: detected capacity change from 0 to 264192 [ 1178.836768][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:56 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff07000000000000630008000000000000000b4000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:56 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00006c5c0002"], 0x8c}}, 0x0) [ 1178.862075][T32603] loop1: detected capacity change from 0 to 264192 [ 1178.878416][T32604] loop5: detected capacity change from 0 to 264192 06:42:56 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff070001a400000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:42:56 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5000e0000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:56 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500040000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1178.913661][ T1440] loop0: p1 < > p2 p3 p4 [ 1178.918054][ T1440] loop0: partition table partially beyond EOD, truncated [ 1178.925263][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1178.931297][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1178.938941][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1178.946747][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1179.000593][ T1440] loop0: p1 < > p2 p3 p4 [ 1179.004978][ T1440] loop0: partition table partially beyond EOD, truncated [ 1179.012152][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1179.018166][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1179.025684][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1179.033223][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:56 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff07000000000000630008000000000000000e4000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:56 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0058655c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1179.069525][ T1440] loop0: p1 < > p2 p3 p4 [ 1179.073886][ T1440] loop0: partition table partially beyond EOD, truncated [ 1179.081067][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1179.087059][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1179.094684][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1179.102440][T32618] loop4: detected capacity change from 0 to 264192 [ 1179.102903][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:56 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000745c0002"], 0x8c}}, 0x0) [ 1179.118468][T32620] loop1: detected capacity change from 0 to 264192 [ 1179.131674][ T1440] loop0: p1 < > p2 p3 p4 [ 1179.136081][ T1440] loop0: partition table partially beyond EOD, truncated [ 1179.138370][T32622] loop5: detected capacity change from 0 to 264192 [ 1179.143162][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1179.155675][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1179.163106][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:42:56 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500050000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:56 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5000f0000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1179.170541][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1179.194096][T32623] loop4: detected capacity change from 0 to 264192 06:42:56 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00007a5c0002"], 0x8c}}, 0x0) 06:42:56 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff070005c500000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1179.234421][ T1440] loop0: p1 < > p2 p3 p4 [ 1179.238806][ T1440] loop0: partition table partially beyond EOD, truncated [ 1179.246024][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1179.252009][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1179.260174][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1179.268918][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:56 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000685c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:56 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000184000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1179.318206][ T1440] loop0: p1 < > p2 p3 p4 [ 1179.322568][ T1440] loop0: partition table partially beyond EOD, truncated [ 1179.329726][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1179.331745][T32637] loop5: detected capacity change from 0 to 264192 [ 1179.335723][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1179.336256][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1179.356792][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:56 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500060000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1179.371033][T32638] loop1: detected capacity change from 0 to 264192 [ 1179.410878][ T1440] loop0: p1 < > p2 p3 p4 06:42:56 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000815c0002"], 0x8c}}, 0x0) 06:42:56 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500110000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1179.415246][ T1440] loop0: partition table partially beyond EOD, truncated [ 1179.422348][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1179.428335][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1179.436628][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1179.444157][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1179.458010][T32644] loop4: detected capacity change from 0 to 264192 [ 1179.496310][ T1440] loop0: p1 < > p2 p3 p4 [ 1179.500736][ T1440] loop0: partition table partially beyond EOD, truncated [ 1179.508005][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1179.513986][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1179.521655][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1179.529321][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:56 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00006c5c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:56 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000264000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1179.540398][T32649] loop4: detected capacity change from 0 to 264192 06:42:56 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff070001cc00000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1179.598212][T32653] loop5: detected capacity change from 0 to 264192 06:42:56 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500070000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:56 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0047885c0002"], 0x8c}}, 0x0) [ 1179.638693][ T1440] loop0: p1 < > p2 p3 p4 [ 1179.643115][ T1440] loop0: partition table partially beyond EOD, truncated [ 1179.650255][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1179.656286][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1179.663771][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1179.672062][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1179.711483][ T1440] loop0: p1 < > p2 p3 p4 [ 1179.715894][ T1440] loop0: partition table partially beyond EOD, truncated [ 1179.717414][T32660] loop1: detected capacity change from 0 to 264192 [ 1179.722952][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1179.735492][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1179.743298][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1179.751708][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:56 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500120000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1179.778401][ T1440] loop0: p1 < > p2 p3 p4 [ 1179.782745][ T1440] loop0: partition table partially beyond EOD, truncated [ 1179.789935][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1179.795942][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1179.803516][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1179.811176][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:56 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000734000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:56 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000745c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1179.826339][ T1440] loop0: p1 < > p2 p3 p4 [ 1179.830793][ T1440] loop0: partition table partially beyond EOD, truncated [ 1179.837921][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1179.844040][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1179.851655][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1179.859409][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1179.887836][T32667] loop4: detected capacity change from 0 to 264192 [ 1179.948690][T32671] loop5: detected capacity change from 0 to 264192 [ 1179.972397][T32670] loop4: detected capacity change from 0 to 264192 06:42:57 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0048885c0002"], 0x8c}}, 0x0) [ 1180.001095][ T1440] loop0: p1 < > p2 p3 p4 [ 1180.005468][ T1440] loop0: partition table partially beyond EOD, truncated [ 1180.012590][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1180.018619][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1180.026172][T32677] loop1: detected capacity change from 0 to 264192 [ 1180.026933][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1180.040679][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:57 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500080000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:57 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000834000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:57 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00007a5c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:57 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500200000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:57 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff070003ce00000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1180.057498][T32678] __nla_validate_parse: 66 callbacks suppressed [ 1180.057514][T32678] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1180.130457][ T1440] loop0: p1 < > p2 p3 p4 [ 1180.134954][ T1440] loop0: partition table partially beyond EOD, truncated [ 1180.142108][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1180.148130][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1180.156530][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1180.164051][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:57 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0009c05c0002"], 0x8c}}, 0x0) [ 1180.177590][T32687] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1180.192077][ T1440] loop0: p1 < > p2 p3 p4 [ 1180.196486][ T1440] loop0: partition table partially beyond EOD, truncated [ 1180.203663][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1180.209656][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1180.217416][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1180.225166][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1180.232336][T32691] loop5: detected capacity change from 0 to 264192 [ 1180.251453][ T1440] loop0: p1 < > p2 p3 p4 [ 1180.255829][ T1440] loop0: partition table partially beyond EOD, truncated [ 1180.259056][T32695] loop1: detected capacity change from 0 to 264192 [ 1180.262881][ T1440] loop0: p1 start 1 is beyond EOD, truncated 06:42:57 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000fe4000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1180.275383][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1180.282102][T32694] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1180.283662][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1180.298959][T32697] loop4: detected capacity change from 0 to 264192 [ 1180.299524][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:57 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000815c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:57 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500250000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1180.342358][ T1440] loop0: p1 < > p2 p3 p4 [ 1180.346806][ T1440] loop0: partition table partially beyond EOD, truncated [ 1180.353940][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1180.359930][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1180.367924][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1180.369599][T32704] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. 06:42:57 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500090000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:57 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000001c0002"], 0x8c}}, 0x0) [ 1180.386979][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1180.397061][T32703] loop4: detected capacity change from 0 to 264192 [ 1180.404531][T32705] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. 06:42:57 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff070003d800000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1180.473076][ T1440] loop0: p1 < > p2 p3 p4 [ 1180.477457][ T1440] loop0: partition table partially beyond EOD, truncated [ 1180.484631][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1180.490672][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1180.499573][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1180.507149][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:57 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000fdef00ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1180.548857][T32712] loop1: detected capacity change from 0 to 264192 [ 1180.558535][ T1440] loop0: p1 < > p2 p3 p4 [ 1180.562883][ T1440] loop0: partition table partially beyond EOD, truncated [ 1180.567306][T32713] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1180.570008][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1180.585477][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated 06:42:57 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0047885c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1180.593876][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1180.601301][T32716] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1180.601424][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1180.622772][T32717] loop5: detected capacity change from 0 to 264192 06:42:57 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000001f0002"], 0x8c}}, 0x0) 06:42:57 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5003f0000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:57 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5000a0000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1180.646647][T32718] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1180.747148][T32721] loop4: detected capacity change from 0 to 264192 [ 1180.756019][ T1440] loop0: p1 < > p2 p3 p4 [ 1180.760454][ T1440] loop0: partition table partially beyond EOD, truncated [ 1180.767660][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1180.773629][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1180.781200][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1180.792664][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:57 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff070000000000006300080000000000000000400effffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1180.819043][T32726] loop4: detected capacity change from 0 to 264192 [ 1180.830180][ T1440] loop0: p1 < > p2 p3 p4 [ 1180.834534][ T1440] loop0: partition table partially beyond EOD, truncated [ 1180.841607][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1180.847600][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1180.850888][T32729] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. 06:42:58 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000025c0002"], 0x8c}}, 0x0) 06:42:58 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0048885c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:58 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff070001ec00000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1180.857062][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1180.866477][T32732] netlink: 60 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1180.873686][T32731] loop1: detected capacity change from 0 to 264192 [ 1180.888127][T32733] loop5: detected capacity change from 0 to 264192 [ 1180.893696][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:58 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5000b0000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:58 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500400000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1180.992959][ T1440] loop0: p1 < > p2 p3 p4 [ 1180.997366][ T1440] loop0: partition table partially beyond EOD, truncated [ 1181.004706][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1181.010739][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1181.018462][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1181.025953][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:58 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff070000000000006300080000000000000000effdffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:58 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000035c0002"], 0x8c}}, 0x0) [ 1181.057487][ T1440] loop0: p1 < > p2 p3 p4 [ 1181.061841][ T1440] loop0: partition table partially beyond EOD, truncated [ 1181.069029][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1181.075016][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1181.082623][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1181.090294][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1181.136043][ T1440] loop0: p1 < > p2 p3 p4 [ 1181.140517][ T1440] loop0: partition table partially beyond EOD, truncated [ 1181.147742][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1181.153715][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1181.161240][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1181.169503][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:58 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0002b25c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1181.185057][T32750] loop4: detected capacity change from 0 to 264192 [ 1181.210017][T32751] loop5: detected capacity change from 0 to 264192 [ 1181.220993][T32752] loop1: detected capacity change from 0 to 264192 06:42:58 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500480000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1181.251386][T32753] loop4: detected capacity change from 0 to 264192 [ 1181.266955][ T1440] loop0: p1 < > p2 p3 p4 [ 1181.271317][ T1440] loop0: partition table partially beyond EOD, truncated [ 1181.278432][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1181.284447][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1181.292169][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:42:58 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5000c0000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:58 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff070003f000000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:42:58 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004002ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1181.300291][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:58 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000045c0002"], 0x8c}}, 0x0) 06:42:58 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000001c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1181.384113][ T1440] loop0: p1 < > p2 p3 p4 [ 1181.388642][ T1440] loop0: partition table partially beyond EOD, truncated [ 1181.395730][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1181.401723][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1181.410125][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1181.417686][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1181.445636][T32766] loop1: detected capacity change from 0 to 264192 [ 1181.467344][T32767] loop5: detected capacity change from 0 to 264192 [ 1181.472325][ T1440] loop0: p1 < > p2 p3 p4 [ 1181.478229][ T1440] loop0: partition table partially beyond EOD, truncated [ 1181.485369][ T1440] loop0: p1 start 1 is beyond EOD, truncated 06:42:58 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004003ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1181.491336][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1181.500956][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1181.508927][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:58 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5004c0000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:58 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000055c0002"], 0x8c}}, 0x0) 06:42:58 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5000d0000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1181.550085][ T306] loop4: detected capacity change from 0 to 264192 [ 1181.559939][ T1440] loop0: p1 < > p2 p3 p4 [ 1181.564300][ T1440] loop0: partition table partially beyond EOD, truncated [ 1181.571418][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1181.577477][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1181.586191][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1181.593866][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:58 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000001f0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1181.652650][ T308] loop4: detected capacity change from 0 to 264192 [ 1181.665891][ T1440] loop0: p1 < > p2 p3 p4 [ 1181.670229][ T1440] loop0: partition table partially beyond EOD, truncated [ 1181.677405][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1181.683390][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1181.692183][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1181.699910][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:58 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff070001fa00000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:42:58 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004004ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:58 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000065c0002"], 0x8c}}, 0x0) [ 1181.730198][ T320] loop5: detected capacity change from 0 to 264192 [ 1181.730765][ T318] loop1: detected capacity change from 0 to 264192 [ 1181.747167][ T1440] loop0: p1 < > p2 p3 p4 [ 1181.751566][ T1440] loop0: partition table partially beyond EOD, truncated [ 1181.758738][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1181.764741][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1181.772336][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1181.780446][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1181.794611][ T1440] loop0: p1 < > p2 p3 p4 [ 1181.798965][ T1440] loop0: partition table partially beyond EOD, truncated [ 1181.806073][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1181.812180][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1181.819717][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:42:58 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5000e0000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:58 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500680000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1181.831103][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:59 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000025c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1181.901730][ T1440] loop0: p1 < > p2 p3 p4 [ 1181.906117][ T1440] loop0: partition table partially beyond EOD, truncated [ 1181.913243][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1181.919362][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1181.927937][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1181.936391][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:59 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000075c0002"], 0x8c}}, 0x0) [ 1181.986793][ T332] loop4: detected capacity change from 0 to 264192 [ 1182.001712][ T1440] loop0: p1 < > p2 p3 p4 [ 1182.006114][ T1440] loop0: partition table partially beyond EOD, truncated [ 1182.013285][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1182.019330][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1182.027285][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:42:59 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004005ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1182.034799][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1182.057051][ T337] loop5: detected capacity change from 0 to 264192 [ 1182.057499][ T1440] loop0: p1 < > p2 p3 p4 [ 1182.066591][ T336] loop4: detected capacity change from 0 to 264192 [ 1182.068052][ T1440] loop0: partition table partially beyond EOD, truncated 06:42:59 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff070003fa00000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:42:59 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5000f0000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1182.081561][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1182.087538][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1182.095820][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1182.103936][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1182.122573][ T338] loop1: detected capacity change from 0 to 264192 06:42:59 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000035c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:59 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000085c0002"], 0x8c}}, 0x0) 06:42:59 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5006c0000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1182.227171][ T1440] loop0: p1 < > p2 p3 p4 [ 1182.231526][ T1440] loop0: partition table partially beyond EOD, truncated [ 1182.238606][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1182.244603][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1182.252222][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1182.259837][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:59 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004006ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1182.280581][ T1440] loop0: p1 < > p2 p3 p4 [ 1182.284967][ T1440] loop0: partition table partially beyond EOD, truncated [ 1182.292029][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1182.298050][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1182.305801][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1182.313479][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1182.360745][ T354] loop5: detected capacity change from 0 to 264192 [ 1182.373252][ T355] loop4: detected capacity change from 0 to 264192 06:42:59 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000045c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:59 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500100000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:59 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000095c0002"], 0x8c}}, 0x0) [ 1182.442122][ T362] loop4: detected capacity change from 0 to 264192 [ 1182.453878][ T364] loop1: detected capacity change from 0 to 264192 [ 1182.467216][ T1440] loop0: p1 < > p2 p3 p4 [ 1182.471642][ T1440] loop0: partition table partially beyond EOD, truncated [ 1182.478812][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1182.484907][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated 06:42:59 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004008ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1182.492545][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1182.501183][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:59 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff070003fc00000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:42:59 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500740000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:59 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000055c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:59 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00000a5c0002"], 0x8c}}, 0x0) [ 1182.604645][ T377] loop5: detected capacity change from 0 to 264192 [ 1182.616986][ T1440] loop0: p1 < > p2 p3 p4 [ 1182.621358][ T1440] loop0: partition table partially beyond EOD, truncated [ 1182.628462][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1182.634442][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1182.642060][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1182.649806][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:42:59 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff070000000000006300080000000000000000400affffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1182.686570][ T383] loop1: detected capacity change from 0 to 264192 [ 1182.721763][ T1440] loop0: p1 < > p2 p3 p4 [ 1182.726154][ T1440] loop0: partition table partially beyond EOD, truncated 06:42:59 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500110000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:59 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000065c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:42:59 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5007a0000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:42:59 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00000b5c0002"], 0x8c}}, 0x0) [ 1182.733428][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1182.739543][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1182.747687][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1182.761239][ T392] loop4: detected capacity change from 0 to 264192 [ 1182.768272][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1182.809950][ T1440] loop0: p1 < > p2 p3 p4 [ 1182.814289][ T1440] loop0: partition table partially beyond EOD, truncated [ 1182.821447][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1182.827443][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1182.835373][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1182.842865][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1182.853361][ T397] loop4: detected capacity change from 0 to 264192 06:43:00 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff070003fe00000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:43:00 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff070000000000006300080000000000000000400bffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1182.939267][ T401] loop5: detected capacity change from 0 to 264192 [ 1182.948150][ T1440] loop0: p1 < > p2 p3 p4 [ 1182.952614][ T1440] loop0: partition table partially beyond EOD, truncated [ 1182.959865][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1182.965966][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1182.973588][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1182.981552][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:00 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500120000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:00 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00000c5c0002"], 0x8c}}, 0x0) [ 1183.022803][ T1440] loop0: p1 < > p2 p3 p4 [ 1183.027164][ T1440] loop0: partition table partially beyond EOD, truncated [ 1183.034223][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1183.040507][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1183.047912][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1183.055568][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1183.066447][ T407] loop1: detected capacity change from 0 to 264192 06:43:00 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000075c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:43:00 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500810000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1183.118046][ T1440] loop0: p1 < > p2 p3 p4 [ 1183.122401][ T1440] loop0: partition table partially beyond EOD, truncated [ 1183.129533][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1183.135525][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1183.144064][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1183.144522][ T414] loop4: detected capacity change from 0 to 264192 [ 1183.151813][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1183.192078][ T417] loop5: detected capacity change from 0 to 264192 [ 1183.200843][ T1440] loop0: p1 < > p2 p3 p4 [ 1183.205226][ T1440] loop0: partition table partially beyond EOD, truncated [ 1183.212272][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1183.218268][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1183.226764][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1183.234351][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:00 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004018ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:00 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00000d5c0002"], 0x8c}}, 0x0) 06:43:00 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500250000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:00 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700fffe00000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1183.245219][ T418] loop4: detected capacity change from 0 to 264192 06:43:00 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000085c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1183.309591][ T428] loop1: detected capacity change from 0 to 264192 [ 1183.338606][ T1440] loop0: p1 < > p2 p3 p4 [ 1183.342954][ T1440] loop0: partition table partially beyond EOD, truncated [ 1183.350166][ T1440] loop0: p1 start 1 is beyond EOD, truncated 06:43:00 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500900000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1183.356202][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1183.364183][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1183.372119][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:00 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00000e5c0002"], 0x8c}}, 0x0) [ 1183.408874][ T1440] loop0: p1 < > p2 p3 p4 [ 1183.413356][ T1440] loop0: partition table partially beyond EOD, truncated [ 1183.420481][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1183.426398][ T434] loop5: detected capacity change from 0 to 264192 [ 1183.426547][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1183.440529][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1183.448813][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:00 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004026ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1183.469509][ T438] loop4: detected capacity change from 0 to 264192 [ 1183.480176][ T1440] loop0: p1 < > p2 p3 p4 [ 1183.484550][ T1440] loop0: partition table partially beyond EOD, truncated [ 1183.491647][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1183.497652][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1183.505376][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1183.512941][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:00 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000095c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:43:00 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500480000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1183.544632][ T1440] loop0: p1 < > p2 p3 p4 [ 1183.548998][ T1440] loop0: partition table partially beyond EOD, truncated [ 1183.556076][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1183.562194][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1183.569889][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1183.578495][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:00 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00000f5c0002"], 0x8c}}, 0x0) [ 1183.593365][ T442] loop4: detected capacity change from 0 to 264192 [ 1183.603874][ T449] loop1: detected capacity change from 0 to 264192 06:43:00 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004073ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1183.643150][ T1440] loop0: p1 < > p2 p3 p4 [ 1183.647519][ T1440] loop0: partition table partially beyond EOD, truncated [ 1183.654771][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1183.660884][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1183.668559][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1183.676556][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:00 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5059f0000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:00 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff07000fff00000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1183.695425][ T1440] loop0: p1 < > p2 p3 p4 [ 1183.699796][ T1440] loop0: partition table partially beyond EOD, truncated [ 1183.706935][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1183.712909][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1183.720529][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1183.728841][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:00 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00000a5c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:43:00 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000105c0002"], 0x8c}}, 0x0) [ 1183.753114][ T455] loop5: detected capacity change from 0 to 264192 06:43:00 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5004c0000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1183.831150][ T1440] loop0: p1 < > p2 p3 p4 [ 1183.835536][ T1440] loop0: partition table partially beyond EOD, truncated [ 1183.842650][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1183.848656][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1183.857655][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1183.865360][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1183.876638][ T466] loop1: detected capacity change from 0 to 264192 [ 1183.892026][ T1440] loop0: p1 < > p2 p3 p4 [ 1183.896402][ T1440] loop0: partition table partially beyond EOD, truncated [ 1183.902722][ T468] loop4: detected capacity change from 0 to 264192 [ 1183.903505][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1183.903531][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1183.924078][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:43:01 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004083ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:01 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa505c50000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1183.932087][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1183.951861][ T1440] loop0: p1 < > p2 p3 p4 [ 1183.956284][ T1440] loop0: partition table partially beyond EOD, truncated [ 1183.963395][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1183.969399][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated 06:43:01 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00000b5c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:43:01 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000115c0002"], 0x8c}}, 0x0) [ 1183.977126][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1183.984633][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1183.998732][ T471] loop4: detected capacity change from 0 to 264192 [ 1184.044007][ T480] loop5: detected capacity change from 0 to 264192 06:43:01 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700feff00000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:43:01 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500680000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:01 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff07000000000000630008000000000000000040feffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1184.097714][ T483] loop1: detected capacity change from 0 to 264192 [ 1184.158614][ T1440] loop0: p1 < > p2 p3 p4 [ 1184.163088][ T1440] loop0: partition table partially beyond EOD, truncated [ 1184.170253][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1184.176255][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1184.183842][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1184.191429][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:01 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00000c5c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:43:01 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5fffe0000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:01 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000125c0002"], 0x8c}}, 0x0) [ 1184.222773][ T1440] loop0: p1 < > p2 p3 p4 [ 1184.227141][ T1440] loop0: partition table partially beyond EOD, truncated [ 1184.234257][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1184.240348][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1184.248071][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1184.256326][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1184.277937][ T496] loop4: detected capacity change from 0 to 264192 [ 1184.278246][ T1440] loop0: p1 < > p2 p3 p4 [ 1184.288916][ T1440] loop0: partition table partially beyond EOD, truncated [ 1184.290753][ T498] loop5: detected capacity change from 0 to 264192 [ 1184.296007][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1184.308451][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1184.315972][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:43:01 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa502000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1184.323445][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:01 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5006c0000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1184.368371][ T499] loop4: detected capacity change from 0 to 264192 [ 1184.376903][ T1440] loop0: p1 < > p2 p3 p4 [ 1184.381293][ T1440] loop0: partition table partially beyond EOD, truncated [ 1184.388402][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1184.394464][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1184.403014][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1184.411253][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:01 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00000d5c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:43:01 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000255c0002"], 0x8c}}, 0x0) 06:43:01 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700000004000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1184.431115][ T507] loop1: detected capacity change from 0 to 264192 06:43:01 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa50fff0000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1184.481684][ T1440] loop0: p1 < > p2 p3 p4 [ 1184.486067][ T1440] loop0: partition table partially beyond EOD, truncated [ 1184.493182][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1184.499209][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1184.506706][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1184.514343][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1184.572456][ T1440] loop0: p1 < > p2 p3 p4 [ 1184.576830][ T1440] loop0: partition table partially beyond EOD, truncated [ 1184.583893][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1184.589875][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1184.597606][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1184.605605][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:01 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa503000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1184.621337][ T514] loop5: detected capacity change from 0 to 264192 [ 1184.633614][ T1440] loop0: p1 < > p2 p3 p4 [ 1184.637978][ T1440] loop0: partition table partially beyond EOD, truncated [ 1184.645153][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1184.651127][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1184.659209][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:43:01 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000485c0002"], 0x8c}}, 0x0) [ 1184.666837][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:01 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500740000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:01 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00000e5c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1184.719085][ T523] loop4: detected capacity change from 0 to 264192 [ 1184.738688][ T525] loop1: detected capacity change from 0 to 264192 [ 1184.747445][ T1440] loop0: p1 < > p2 p3 p4 [ 1184.751771][ T1440] loop0: partition table partially beyond EOD, truncated [ 1184.758897][ T1440] loop0: p1 start 1 is beyond EOD, truncated 06:43:01 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa504000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1184.765049][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1184.773147][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1184.781552][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1184.786092][ T523] loop4: p1 < > p2 p3 p4 [ 1184.795151][ T523] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1184.802688][ T523] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1184.812354][ T1440] loop0: p1 < > p2 p3 p4 06:43:02 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00004c5c0002"], 0x8c}}, 0x0) 06:43:02 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5feff0000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1184.816815][ T1440] loop0: partition table partially beyond EOD, truncated [ 1184.823909][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1184.829899][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1184.837578][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1184.845066][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1184.884604][ T527] loop4: detected capacity change from 0 to 264192 [ 1184.900973][ T534] loop5: detected capacity change from 0 to 264192 [ 1184.925397][ T527] loop4: p1 < > p2 p3 p4 [ 1184.930113][ T527] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1184.941579][ T527] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:43:02 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5007a0000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:02 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00000f5c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:43:02 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700f80704000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1184.971715][ T1440] loop0: p1 < > p2 p3 p4 [ 1184.976094][ T1440] loop0: partition table partially beyond EOD, truncated [ 1184.983146][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1184.989161][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1184.996800][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1185.004408][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:02 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa505000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1185.021933][ T1440] loop4: p1 < > p2 p3 p4 [ 1185.026771][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1185.034402][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:43:02 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000585c0002"], 0x8c}}, 0x0) [ 1185.071748][ T543] __nla_validate_parse: 67 callbacks suppressed [ 1185.071785][ T543] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1185.089874][ T1440] loop0: p1 < > p2 p3 p4 [ 1185.094228][ T1440] loop0: partition table partially beyond EOD, truncated [ 1185.101406][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1185.107423][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1185.115333][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1185.122838][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1185.132855][ T546] loop1: detected capacity change from 0 to 264192 [ 1185.195493][ T1440] loop0: p1 < > p2 p3 p4 [ 1185.199863][ T1440] loop0: partition table partially beyond EOD, truncated [ 1185.207211][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1185.213281][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1185.217678][ T552] loop5: detected capacity change from 0 to 264192 [ 1185.231922][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:43:02 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5f8070400000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1185.235253][ T553] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1185.240210][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1185.283744][ T559] loop4: detected capacity change from 0 to 264192 06:43:02 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000105c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1185.295418][ T560] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1185.307285][ T1440] loop0: p1 < > p2 p3 p4 [ 1185.311679][ T1440] loop0: partition table partially beyond EOD, truncated [ 1185.318900][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1185.324916][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1185.332948][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:43:02 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500900000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:02 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa506000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1185.333323][ T562] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1185.343411][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1185.377281][ T1440] loop0: p1 < > p2 p3 p4 [ 1185.381877][ T1440] loop0: partition table partially beyond EOD, truncated [ 1185.389023][ T1440] loop0: p1 start 1 is beyond EOD, truncated 06:43:02 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000605c0002"], 0x8c}}, 0x0) [ 1185.395018][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1185.403409][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1185.407309][ T561] loop4: detected capacity change from 0 to 264192 [ 1185.411741][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:02 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700ff0704000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1185.524341][ T564] loop1: detected capacity change from 0 to 264192 [ 1185.562966][ T1440] loop0: p1 < > p2 p3 p4 06:43:02 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000115c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1185.563850][ T568] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1185.567397][ T1440] loop0: partition table partially beyond EOD, truncated [ 1185.583837][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1185.589894][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1185.597622][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1185.605396][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1185.613109][ T572] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. 06:43:02 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5ff070400000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1185.667018][ T573] loop5: detected capacity change from 0 to 264192 [ 1185.686179][ T1440] loop0: p1 < > p2 p3 p4 [ 1185.690620][ T1440] loop0: partition table partially beyond EOD, truncated [ 1185.697886][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1185.701491][ T575] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. 06:43:02 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa508000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:02 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000685c0002"], 0x8c}}, 0x0) 06:43:02 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500fe0000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1185.703860][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1185.704349][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1185.728330][ T576] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1185.728474][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1185.776726][ T1440] loop0: p1 < > p2 p3 p4 [ 1185.781215][ T1440] loop0: partition table partially beyond EOD, truncated [ 1185.788372][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1185.794357][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1185.802166][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1185.809769][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1185.840405][ T580] loop4: detected capacity change from 0 to 264192 [ 1185.873530][ T581] loop1: detected capacity change from 0 to 264192 [ 1185.890788][ T582] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1185.908971][ T584] loop4: detected capacity change from 0 to 264192 [ 1185.909847][ T586] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1185.936939][ T1440] loop0: p1 < > p2 p3 p4 06:43:03 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000125c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:43:03 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500080400000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:03 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00006c5c0002"], 0x8c}}, 0x0) 06:43:03 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa50a000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:03 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700000804000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1185.941291][ T1440] loop0: partition table partially beyond EOD, truncated [ 1185.948495][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1185.954466][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1185.962641][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1185.970448][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1185.975901][ T592] loop5: detected capacity change from 0 to 264192 06:43:03 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500040200000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1186.055096][ T1440] loop0: p1 < > p2 p3 p4 [ 1186.059580][ T1440] loop0: partition table partially beyond EOD, truncated [ 1186.066680][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1186.072641][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1186.081213][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1186.097878][ T599] loop1: detected capacity change from 0 to 264192 06:43:03 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000745c0002"], 0x8c}}, 0x0) 06:43:03 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000255c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1186.101189][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1186.141573][ T1440] loop0: p1 < > p2 p3 p4 [ 1186.146009][ T1440] loop0: partition table partially beyond EOD, truncated 06:43:03 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa50b000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1186.153071][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1186.159067][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1186.167150][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1186.174663][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1186.193940][ T608] loop4: detected capacity change from 0 to 264192 06:43:03 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000800000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1186.205315][ T1440] loop0: p1 < > p2 p3 p4 [ 1186.209719][ T1440] loop0: partition table partially beyond EOD, truncated [ 1186.216866][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1186.222841][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1186.230509][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1186.238033][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:03 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00007a5c0002"], 0x8c}}, 0x0) 06:43:03 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700000008000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1186.261252][ T610] loop4: detected capacity change from 0 to 264192 [ 1186.267402][ T613] loop5: detected capacity change from 0 to 264192 06:43:03 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00002c5c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:43:03 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000300000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1186.341354][ T1440] loop0: p1 < > p2 p3 p4 [ 1186.345802][ T1440] loop0: partition table partially beyond EOD, truncated [ 1186.352868][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1186.358949][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1186.366704][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1186.374154][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1186.406764][ T1440] loop0: p1 < > p2 p3 p4 [ 1186.411150][ T1440] loop0: partition table partially beyond EOD, truncated [ 1186.418323][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1186.424291][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1186.431778][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1186.440416][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:03 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa518000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1186.454572][ T1440] loop0: p1 < > p2 p3 p4 [ 1186.458978][ T1440] loop0: partition table partially beyond EOD, truncated [ 1186.466058][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1186.472028][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1186.481606][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1186.481997][ T624] loop1: detected capacity change from 0 to 264192 [ 1186.489883][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:03 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d000000040002"], 0x8c}}, 0x0) 06:43:03 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa540000800000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:03 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000485c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1186.574003][ T632] loop4: detected capacity change from 0 to 264192 [ 1186.593985][ T634] loop5: detected capacity change from 0 to 264192 [ 1186.604034][ T1440] loop0: p1 < > p2 p3 p4 [ 1186.608411][ T1440] loop0: partition table partially beyond EOD, truncated [ 1186.615614][ T1440] loop0: p1 start 1 is beyond EOD, truncated 06:43:03 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500020400000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1186.621572][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1186.630520][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1186.631502][ T632] loop4: p1 < > p2 p3 p4 [ 1186.639077][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1186.642752][ T632] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1186.658697][ T632] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1186.718645][ T637] loop4: detected capacity change from 0 to 264192 [ 1186.719622][ T1440] loop0: p1 < > p2 p3 p4 [ 1186.729567][ T1440] loop0: partition table partially beyond EOD, truncated [ 1186.736728][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1186.742700][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1186.754812][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1186.756371][ T637] loop4: p1 < > p2 p3 p4 06:43:03 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa526000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1186.762594][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1186.770210][ T637] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1186.785108][ T637] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1186.797827][ T1440] loop0: p1 < > p2 p3 p4 [ 1186.802335][ T1440] loop0: partition table partially beyond EOD, truncated [ 1186.809495][ T1440] loop0: p1 start 1 is beyond EOD, truncated 06:43:04 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700400008000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1186.811128][ T642] netem: invalid attributes len -24 [ 1186.815490][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1186.818528][ T643] loop1: detected capacity change from 0 to 264192 [ 1186.824315][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1186.843301][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:04 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000001c0002"], 0x8c}}, 0x0) 06:43:04 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500040800000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:04 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00004c5c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:43:04 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500060400000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1186.865199][ T1440] loop4: p1 < > p2 p3 p4 [ 1186.870446][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1186.878931][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1186.903416][ T649] loop5: detected capacity change from 0 to 264192 06:43:04 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0202"], 0x8c}}, 0x0) [ 1186.973015][ T1440] loop0: p1 < > p2 p3 p4 [ 1186.977504][ T1440] loop0: partition table partially beyond EOD, truncated [ 1186.984657][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1186.990651][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1186.998139][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1187.005642][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:04 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa573000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1187.041124][ T659] loop1: detected capacity change from 0 to 264192 [ 1187.048724][ T1440] loop0: p1 < > p2 p3 p4 [ 1187.053133][ T1440] loop0: partition table partially beyond EOD, truncated [ 1187.060242][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1187.066294][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1187.074283][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1187.081910][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:04 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500008100000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1187.108190][ T661] loop4: detected capacity change from 0 to 264192 [ 1187.125965][ T664] loop5: detected capacity change from 0 to 264192 06:43:04 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000585c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1187.167102][ T661] loop4: p1 < > p2 p3 p4 [ 1187.171942][ T661] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1187.173800][ T1440] loop0: p1 < > p2 p3 p4 [ 1187.180133][ T661] loop4: p3 size 1912633224 extends beyond EOD, [ 1187.183421][ T1440] loop0: partition table partially beyond EOD, truncated [ 1187.189790][ T661] truncated [ 1187.196826][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1187.205943][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated 06:43:04 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0302"], 0x8c}}, 0x0) [ 1187.213441][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1187.221285][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:04 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000500000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1187.267079][ T668] loop4: detected capacity change from 0 to 264192 [ 1187.277547][ T1440] loop0: p1 < > p2 p3 p4 [ 1187.281910][ T1440] loop0: partition table partially beyond EOD, truncated [ 1187.289052][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1187.295040][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1187.303743][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1187.306551][ T668] loop4: p1 < > p2 p3 p4 06:43:04 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa583000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1187.312318][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1187.317344][ T668] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1187.330930][ T668] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1187.343646][ T1440] loop0: p1 < > p2 p3 p4 [ 1187.347982][ T1440] loop0: partition table partially beyond EOD, truncated [ 1187.355193][ T1440] loop0: p1 start 1 is beyond EOD, truncated 06:43:04 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700000408000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1187.361276][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1187.368946][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1187.377225][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1187.391243][ T676] loop1: detected capacity change from 0 to 264192 [ 1187.394677][ T1440] loop4: p1 < > p2 p3 p4 [ 1187.402546][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1187.410171][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:43:04 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0402"], 0x8c}}, 0x0) 06:43:04 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000605c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:43:04 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500009000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1187.484842][ T686] loop5: detected capacity change from 0 to 264192 [ 1187.504714][ T1440] loop0: p1 < > p2 p3 p4 [ 1187.509312][ T1440] loop0: partition table partially beyond EOD, truncated [ 1187.516415][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1187.522415][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated 06:43:04 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5009f0500000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1187.530005][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1187.537714][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1187.561223][ T1440] loop0: p1 < > p2 p3 p4 [ 1187.565668][ T1440] loop0: partition table partially beyond EOD, truncated [ 1187.573493][ T1440] loop0: p1 start 1 is beyond EOD, truncated 06:43:04 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa5fe000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1187.579530][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1187.587128][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1187.594627][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1187.616689][ T1440] loop0: p1 < > p2 p3 p4 [ 1187.621119][ T1440] loop0: partition table partially beyond EOD, truncated [ 1187.628229][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1187.634198][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1187.642091][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1187.650798][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1187.686360][ T690] loop4: detected capacity change from 0 to 264192 06:43:04 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0502"], 0x8c}}, 0x0) [ 1187.760121][ T694] loop4: detected capacity change from 0 to 264192 [ 1187.773045][ T698] loop1: detected capacity change from 0 to 264192 [ 1187.787709][ T1440] loop0: p1 < > p2 p3 p4 [ 1187.792057][ T1440] loop0: partition table partially beyond EOD, truncated [ 1187.799148][ T1440] loop0: p1 start 1 is beyond EOD, truncated 06:43:04 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000685c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:43:04 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa504020000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1187.805120][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1187.813469][ T702] loop5: detected capacity change from 0 to 264192 [ 1187.814753][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1187.832096][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:05 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700000010000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:43:05 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000001000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:05 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500c50500000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:05 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0602"], 0x8c}}, 0x0) [ 1187.939212][ T1440] loop0: p1 < > p2 p3 p4 [ 1187.943614][ T1440] loop0: partition table partially beyond EOD, truncated [ 1187.950812][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1187.956783][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1187.964340][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1187.972019][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1187.994206][ T1440] loop0: p1 < > p2 p3 p4 [ 1187.998551][ T1440] loop0: partition table partially beyond EOD, truncated [ 1188.005753][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1188.011779][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1188.019451][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1188.026936][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1188.072181][ T1440] loop0: p1 < > p2 p3 p4 [ 1188.076558][ T1440] loop0: partition table partially beyond EOD, truncated [ 1188.083616][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1188.089622][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1188.097286][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1188.105544][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:05 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00006c5c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:43:05 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa500030000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1188.123789][ T720] loop1: detected capacity change from 0 to 264192 [ 1188.133423][ T721] loop5: detected capacity change from 0 to 264192 [ 1188.142863][ T1440] loop0: p1 < > p2 p3 p4 [ 1188.147270][ T1440] loop0: partition table partially beyond EOD, truncated [ 1188.154523][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1188.160617][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated 06:43:05 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0702"], 0x8c}}, 0x0) 06:43:05 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000600000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:05 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000002000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1188.169085][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1188.176857][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1188.193559][ T722] loop4: detected capacity change from 0 to 264192 [ 1188.235136][ T1440] loop4: p1 < > p2 p3 p4 [ 1188.239923][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1188.247642][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1188.258697][ T722] loop4: p1 < > p2 p3 p4 [ 1188.263489][ T722] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1188.271280][ T722] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1188.292131][ T1440] loop0: p1 < > p2 p3 p4 [ 1188.296485][ T1440] loop0: partition table partially beyond EOD, truncated [ 1188.303559][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1188.309551][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1188.317232][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1188.325420][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:05 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa580030000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:05 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0802"], 0x8c}}, 0x0) 06:43:05 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000745c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1188.343116][ T725] loop4: detected capacity change from 0 to 264192 [ 1188.359957][ T736] loop5: detected capacity change from 0 to 264192 [ 1188.379628][ T739] loop1: detected capacity change from 0 to 264192 [ 1188.406016][ T725] loop4: p1 < > p2 p3 p4 [ 1188.410929][ T725] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1188.418565][ T725] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:43:05 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700000081000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:43:05 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500040600000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:05 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000402000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:05 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa502040000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:05 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0902"], 0x8c}}, 0x0) [ 1188.478359][ T1440] loop4: p1 < > p2 p3 p4 [ 1188.485432][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1188.493247][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:43:05 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d00007a5c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1188.545265][ T1440] loop0: p1 < > p2 p3 p4 [ 1188.549614][ T1440] loop0: partition table partially beyond EOD, truncated [ 1188.556849][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1188.562935][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1188.570700][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1188.578358][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1188.593041][ T1440] loop4: p1 < > p2 p3 p4 [ 1188.597749][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1188.605379][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1188.608930][ T751] loop5: detected capacity change from 0 to 264192 [ 1188.664541][ T1440] loop0: p1 < > p2 p3 p4 [ 1188.668899][ T1440] loop0: partition table partially beyond EOD, truncated [ 1188.675981][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1188.681994][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1188.689725][ T754] loop1: detected capacity change from 0 to 264192 [ 1188.690567][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1188.703837][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:05 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000700000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:05 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa506040000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:05 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0a02"], 0x8c}}, 0x0) [ 1188.738479][ T1440] loop0: p1 < > p2 p3 p4 [ 1188.742917][ T1440] loop0: partition table partially beyond EOD, truncated [ 1188.750157][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1188.756190][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1188.764200][ T760] loop4: detected capacity change from 0 to 264192 [ 1188.772097][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:43:05 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000003000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:05 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d000000040002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1188.787960][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1188.809945][ T1440] loop0: p1 < > p2 p3 p4 [ 1188.814414][ T1440] loop0: partition table partially beyond EOD, truncated [ 1188.821498][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1188.822644][ T760] loop4: p1 < > p2 p3 p4 [ 1188.827530][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1188.828027][ T1440] loop0: p3 size 1912633224 extends beyond EOD, [ 1188.834307][ T760] loop4: p2 size 1073741824 extends beyond EOD, [ 1188.839084][ T1440] truncated [ 1188.845393][ T760] truncated [ 1188.847026][ T760] loop4: p3 size 1912633224 extends beyond EOD, [ 1188.852485][ T1440] loop0: p4 size 32768 extends beyond EOD, [ 1188.854818][ T760] truncated [ 1188.873245][ T1440] truncated [ 1188.902175][ T766] loop4: detected capacity change from 0 to 264192 [ 1188.905237][ T1440] loop0: p1 < > p2 p3 p4 [ 1188.913012][ T1440] loop0: partition table partially beyond EOD, truncated [ 1188.920091][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1188.926194][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1188.933983][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1188.941871][ T766] loop4: p1 < > p2 p3 p4 [ 1188.942375][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1188.948099][ T766] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1188.960543][ T766] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:43:06 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700000090000063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:43:06 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa500050000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1189.002150][ T1440] loop4: p1 < > p2 p3 p4 [ 1189.007869][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1189.015639][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1189.037657][ T770] loop5: detected capacity change from 0 to 264192 06:43:06 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0b02"], 0x8c}}, 0x0) 06:43:06 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000900000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1189.094142][ T776] loop1: detected capacity change from 0 to 264192 [ 1189.110620][ T777] netem: invalid attributes len -24 [ 1189.115885][ T777] netem: change failed [ 1189.122012][ T1440] loop4: p1 < > p2 p3 p4 [ 1189.127561][ T780] netem: invalid attributes len -24 [ 1189.127743][ T1440] loop4: p2 size 1073741824 extends beyond EOD, [ 1189.132798][ T780] netem: change failed 06:43:06 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000001c0002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:43:06 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000004000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1189.143395][ T1440] truncated [ 1189.147089][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1189.200153][ T1440] loop0: p1 < > p2 p3 p4 [ 1189.204519][ T1440] loop0: partition table partially beyond EOD, truncated [ 1189.211711][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1189.217730][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1189.226775][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1189.234339][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1189.251481][ T1440] loop0: p1 < > p2 p3 p4 [ 1189.255848][ T1440] loop0: partition table partially beyond EOD, truncated [ 1189.263118][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1189.269157][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1189.276798][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1189.284300][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1189.288802][ T782] loop4: detected capacity change from 0 to 264192 [ 1189.308417][ T1440] loop0: p1 < > p2 p3 p4 [ 1189.312791][ T1440] loop0: partition table partially beyond EOD, truncated [ 1189.319920][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1189.326010][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1189.333610][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1189.341249][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1189.348717][ T782] loop4: p1 < > p2 p3 p4 [ 1189.353943][ T782] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1189.362910][ T782] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1189.381165][ T1440] loop0: p1 < > p2 p3 p4 [ 1189.385616][ T1440] loop0: partition table partially beyond EOD, truncated [ 1189.392671][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1189.398704][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated 06:43:06 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0c02"], 0x8c}}, 0x0) 06:43:06 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa500060000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1189.405703][ T788] loop5: detected capacity change from 0 to 264192 [ 1189.408901][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1189.419984][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1189.437536][ T785] loop4: detected capacity change from 0 to 264192 [ 1189.452565][ T794] loop1: detected capacity change from 0 to 264192 [ 1189.463626][ T1440] loop0: p1 < > p2 p3 p4 [ 1189.468031][ T1440] loop0: partition table partially beyond EOD, truncated [ 1189.475111][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1189.481130][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1189.488951][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1189.496418][ T785] loop4: p1 < > p2 p3 p4 [ 1189.497081][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:06 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000a00000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:06 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0202000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1189.504084][ T785] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1189.530278][ T785] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:43:06 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000005000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:06 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700000000010063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1189.578730][ T1440] loop4: p1 < > p2 p3 p4 [ 1189.583732][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1189.592654][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:43:06 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0d02"], 0x8c}}, 0x0) [ 1189.648477][ T1440] loop0: p1 < > p2 p3 p4 [ 1189.652845][ T1440] loop0: partition table partially beyond EOD, truncated [ 1189.659978][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1189.666024][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1189.673703][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1189.681320][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:06 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa504060000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1189.702119][ T1440] loop0: p1 < > p2 p3 p4 [ 1189.706532][ T1440] loop0: partition table partially beyond EOD, truncated [ 1189.713597][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1189.719630][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1189.723806][ T805] loop5: detected capacity change from 0 to 264192 [ 1189.729759][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1189.741615][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:06 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0302000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:43:06 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000b00000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1189.780581][ T812] loop1: detected capacity change from 0 to 264192 [ 1189.813001][ T814] loop4: detected capacity change from 0 to 264192 06:43:06 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0e02"], 0x8c}}, 0x0) [ 1189.833186][ T1440] loop0: p1 < > p2 p3 p4 [ 1189.837595][ T1440] loop0: partition table partially beyond EOD, truncated [ 1189.844699][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1189.850703][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1189.858878][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1189.866497][ T814] loop4: p1 < > p2 p3 p4 [ 1189.866733][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:07 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa5000a0000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:07 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000006000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1189.872143][ T814] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1189.885173][ T814] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1189.913405][ T1440] loop0: p1 < > p2 p3 p4 [ 1189.917780][ T1440] loop0: partition table partially beyond EOD, truncated [ 1189.924819][ T1440] loop0: p1 start 1 is beyond EOD, truncated 06:43:07 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0402000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1189.930801][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1189.939596][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1189.948140][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1189.960826][ T819] loop4: detected capacity change from 0 to 264192 06:43:07 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0f02"], 0x8c}}, 0x0) [ 1189.993227][ T827] loop5: detected capacity change from 0 to 264192 [ 1190.007731][ T1440] loop4: p1 < > p2 p3 p4 [ 1190.012920][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1190.021061][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1190.031325][ T819] loop4: p1 < > p2 p3 p4 [ 1190.036190][ T819] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1190.044180][ T819] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1190.062734][ T1440] loop0: p1 < > p2 p3 p4 [ 1190.067159][ T1440] loop0: partition table partially beyond EOD, truncated [ 1190.074275][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1190.078287][ T833] loop1: detected capacity change from 0 to 264192 [ 1190.080290][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated 06:43:07 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700000000020063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:43:07 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000c00000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:07 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa5000b0000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1190.094703][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1190.114060][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1190.131545][ T1440] loop4: p1 < > p2 p3 p4 [ 1190.136834][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated 06:43:07 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000406000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1190.144780][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1190.172862][ T836] __nla_validate_parse: 60 callbacks suppressed [ 1190.172878][ T836] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1190.190902][ T839] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1190.190948][ T1440] loop0: p1 < > p2 p3 p4 [ 1190.204565][ T1440] loop0: partition table partially beyond EOD, truncated [ 1190.208805][ T840] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1190.211744][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1190.226971][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1190.235025][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:43:07 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0502000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:43:07 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c1002"], 0x8c}}, 0x0) [ 1190.255268][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1190.291265][ T1440] loop0: p1 < > p2 p3 p4 [ 1190.295806][ T1440] loop0: partition table partially beyond EOD, truncated [ 1190.303006][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1190.308996][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1190.316834][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1190.324489][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1190.340020][ T846] loop5: detected capacity change from 0 to 264192 06:43:07 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa500180000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1190.358082][ T1440] loop0: p1 < > p2 p3 p4 [ 1190.362434][ T1440] loop0: partition table partially beyond EOD, truncated [ 1190.369547][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1190.375538][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1190.383797][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1190.391882][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1190.408760][ T850] loop4: detected capacity change from 0 to 264192 [ 1190.408846][ T849] loop1: detected capacity change from 0 to 264192 [ 1190.423844][ T1440] loop0: p1 < > p2 p3 p4 [ 1190.428479][ T1440] loop0: partition table partially beyond EOD, truncated [ 1190.435606][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1190.441598][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1190.449727][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:43:07 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000d00000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1190.458804][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1190.470488][ T850] loop4: p1 < > p2 p3 p4 [ 1190.477557][ T850] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1190.485372][ T850] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1190.493224][ T855] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1190.508523][ T853] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1190.518426][ T856] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1190.544385][ T852] loop4: detected capacity change from 0 to 264192 [ 1190.552455][ T1440] loop0: p1 < > p2 p3 p4 06:43:07 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c1102"], 0x8c}}, 0x0) 06:43:07 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000007000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1190.556850][ T1440] loop0: partition table partially beyond EOD, truncated [ 1190.564016][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1190.566202][ T859] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1190.570056][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1190.588594][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1190.595283][ T852] loop4: p1 < > p2 p3 p4 [ 1190.601103][ T852] loop4: p2 size 1073741824 extends beyond EOD, truncated 06:43:07 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0602000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:43:07 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa500200000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1190.601202][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1190.611128][ T852] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:43:07 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700000004020063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1190.666443][ T1440] loop4: p1 < > p2 p3 p4 [ 1190.672114][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1190.679781][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1190.725855][ T862] loop5: detected capacity change from 0 to 264192 [ 1190.733163][ T1440] loop4: p1 < > p2 p3 p4 [ 1190.737925][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1190.745461][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1190.781395][ T1440] loop0: p1 < > p2 p3 p4 [ 1190.785866][ T1440] loop0: partition table partially beyond EOD, truncated [ 1190.793254][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1190.799258][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1190.804275][ T867] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1190.809657][ T866] loop1: detected capacity change from 0 to 264192 [ 1190.820185][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1190.830267][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1190.851303][ T872] loop4: detected capacity change from 0 to 264192 [ 1190.860720][ T869] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1190.876980][ T1440] loop0: p1 < > p2 p3 p4 06:43:08 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000e00000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:08 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c1202"], 0x8c}}, 0x0) [ 1190.881375][ T1440] loop0: partition table partially beyond EOD, truncated [ 1190.888577][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1190.894564][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1190.902620][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1190.910532][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1190.911212][ T872] loop4: p1 < > p2 p3 p4 06:43:08 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000008000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1190.936776][ T872] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1190.944009][ T877] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1190.946682][ T1440] loop0: p1 < > p2 p3 p4 [ 1190.954172][ T872] loop4: p3 size 1912633224 extends beyond EOD, [ 1190.957690][ T1440] loop0: partition table partially beyond EOD, truncated [ 1190.957741][ T1440] loop0: p1 start 1 is beyond EOD, [ 1190.964005][ T872] truncated [ 1190.979288][ T1440] truncated 06:43:08 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0702000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:43:08 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa500260000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1190.982370][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1190.991057][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1191.001086][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1191.025292][ T874] loop4: detected capacity change from 0 to 264192 [ 1191.025969][ T1440] loop0: p1 < > p2 p3 p4 [ 1191.036172][ T1440] loop0: partition table partially beyond EOD, truncated [ 1191.043396][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1191.049513][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1191.057512][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1191.065331][ T874] loop4: p1 < > p2 p3 p4 [ 1191.066059][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1191.070099][ T874] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1191.084067][ T874] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:43:08 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700000000030063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:43:08 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c2502"], 0x8c}}, 0x0) [ 1191.130110][ T1440] loop4: p1 < > p2 p3 p4 [ 1191.136542][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1191.144959][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1191.160622][ T882] loop5: detected capacity change from 0 to 264192 [ 1191.176171][ T884] loop1: detected capacity change from 0 to 264192 06:43:08 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0802000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:43:08 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa5003f0000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1191.228400][ T1440] loop0: p1 < > p2 p3 p4 [ 1191.232787][ T1440] loop0: partition table partially beyond EOD, truncated [ 1191.240066][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1191.246096][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1191.254371][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1191.262111][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:08 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000009000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:08 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000f00000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1191.300200][ T1440] loop0: p1 < > p2 p3 p4 [ 1191.304555][ T1440] loop0: partition table partially beyond EOD, truncated [ 1191.311848][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1191.317890][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1191.325577][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1191.333122][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:08 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c4802"], 0x8c}}, 0x0) [ 1191.409553][ T896] loop4: detected capacity change from 0 to 264192 [ 1191.451665][ T896] loop4: p1 < > p2 p3 p4 [ 1191.456368][ T1440] loop0: p1 < > p2 p3 p4 [ 1191.456720][ T896] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1191.460709][ T1440] loop0: partition table partially beyond EOD, truncated [ 1191.468308][ T896] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1191.474952][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1191.488052][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1191.496698][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1191.504161][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1191.521895][ T899] loop4: detected capacity change from 0 to 264192 [ 1191.542189][ T906] loop5: detected capacity change from 0 to 264192 06:43:08 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa500400000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:08 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0902000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1191.549144][ T907] loop1: detected capacity change from 0 to 264192 [ 1191.566873][ T1440] loop4: p1 < > p2 p3 p4 [ 1191.571857][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1191.579968][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1191.589414][ T899] loop4: p1 < > p2 p3 p4 [ 1191.594194][ T899] loop4: p2 size 1073741824 extends beyond EOD, truncated 06:43:08 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700000000040063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:43:08 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500001100000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:08 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c4c02"], 0x8c}}, 0x0) [ 1191.602245][ T899] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:43:08 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa50000000a000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1191.671711][ T1440] loop0: p1 < > p2 p3 p4 [ 1191.676238][ T1440] loop0: partition table partially beyond EOD, truncated [ 1191.683306][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1191.689320][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1191.697140][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1191.704584][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1191.722567][ T1440] loop4: p1 < > p2 p3 p4 [ 1191.727358][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1191.734821][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:43:08 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa500730000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:08 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0a02000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1191.806804][ T1440] loop0: p1 < > p2 p3 p4 [ 1191.811176][ T1440] loop0: partition table partially beyond EOD, truncated [ 1191.818329][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1191.824361][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1191.831868][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1191.841299][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1191.857065][ T924] loop5: detected capacity change from 0 to 264192 [ 1191.864649][ T1440] loop0: p1 < > p2 p3 p4 [ 1191.869043][ T1440] loop0: partition table partially beyond EOD, truncated [ 1191.876132][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1191.882094][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1191.889755][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1191.897317][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:09 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500001200000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:09 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c5802"], 0x8c}}, 0x0) [ 1191.930274][ T925] loop4: detected capacity change from 0 to 264192 [ 1191.943191][ T928] loop1: detected capacity change from 0 to 264192 [ 1191.986275][ T925] loop4: p1 < > p2 p3 p4 [ 1191.991944][ T925] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1192.002293][ T925] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1192.020132][ T1440] loop0: p1 < > p2 p3 p4 [ 1192.024512][ T1440] loop0: partition table partially beyond EOD, truncated 06:43:09 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa50000000b000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1192.031708][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1192.037697][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1192.045632][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1192.053973][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1192.077231][ T929] loop4: detected capacity change from 0 to 264192 [ 1192.106811][ T1440] loop0: p1 < > p2 p3 p4 [ 1192.111391][ T1440] loop0: partition table partially beyond EOD, truncated [ 1192.115310][ T929] loop4: p1 < > p2 p3 p4 06:43:09 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0b02000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:43:09 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa503800000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1192.118523][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1192.123526][ T929] loop4: p2 size 1073741824 extends beyond EOD, [ 1192.128758][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1192.131081][ T1440] loop0: p3 size 1912633224 extends beyond EOD, [ 1192.135145][ T929] truncated [ 1192.144810][ T929] loop4: p3 size 1912633224 extends beyond EOD, [ 1192.148617][ T1440] truncated [ 1192.149311][ T1440] loop0: p4 size 32768 extends beyond EOD, [ 1192.151719][ T929] truncated [ 1192.170185][ T1440] truncated 06:43:09 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700000000050063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1192.216257][ T1440] loop4: p1 < > p2 p3 p4 [ 1192.221807][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1192.229454][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1192.281201][ T1440] loop0: p1 < > p2 p3 p4 [ 1192.285601][ T1440] loop0: partition table partially beyond EOD, truncated [ 1192.292672][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1192.298661][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1192.306426][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1192.313881][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:09 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c6002"], 0x8c}}, 0x0) [ 1192.348864][ T940] loop5: detected capacity change from 0 to 264192 [ 1192.394285][ T943] loop1: detected capacity change from 0 to 264192 [ 1192.408923][ T1440] loop0: p1 < > p2 p3 p4 [ 1192.413390][ T1440] loop0: partition table partially beyond EOD, truncated [ 1192.420725][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1192.426722][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1192.434685][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:43:09 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500002000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1192.444712][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:09 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa50000000c000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1192.499550][ T1440] loop0: p1 < > p2 p3 p4 [ 1192.503903][ T1440] loop0: partition table partially beyond EOD, truncated [ 1192.511039][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1192.517025][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1192.525381][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1192.533034][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:09 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0c02000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:43:09 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa500830000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1192.555034][ T1440] loop0: p1 < > p2 p3 p4 [ 1192.559448][ T1440] loop0: partition table partially beyond EOD, truncated [ 1192.566557][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1192.572528][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1192.580134][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1192.583635][ T952] loop4: detected capacity change from 0 to 264192 [ 1192.588380][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1192.616142][ T952] loop4: p1 < > p2 p3 p4 [ 1192.620925][ T952] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1192.629591][ T952] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:43:09 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c6802"], 0x8c}}, 0x0) [ 1192.672113][ T954] loop4: detected capacity change from 0 to 264192 [ 1192.717530][ T954] loop4: p1 < > p2 p3 p4 [ 1192.724209][ T954] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1192.732579][ T954] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1192.744273][ T1440] loop0: p1 < > p2 p3 p4 [ 1192.746395][ T960] loop5: detected capacity change from 0 to 264192 [ 1192.748732][ T1440] loop0: partition table partially beyond EOD, truncated 06:43:09 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700000000060063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1192.762359][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1192.768484][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1192.776019][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1192.783515][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1192.801133][ T962] loop1: detected capacity change from 0 to 264192 06:43:09 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa5fdef0000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:10 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500002500000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:10 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0d02000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1192.815278][ T1440] loop4: p1 < > p2 p3 p4 [ 1192.820522][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1192.834988][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:43:10 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c6c02"], 0x8c}}, 0x0) 06:43:10 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa50000000d000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1192.892612][ T1440] loop0: p1 < > p2 p3 p4 [ 1192.897019][ T1440] loop0: partition table partially beyond EOD, truncated [ 1192.904205][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1192.910433][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1192.918077][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1192.925702][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1192.958128][ T1440] loop0: p1 < > p2 p3 p4 [ 1192.962477][ T1440] loop0: partition table partially beyond EOD, truncated [ 1192.969608][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1192.975625][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1192.983623][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1192.991408][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1193.019240][ T1440] loop0: p1 < > p2 p3 p4 [ 1193.023594][ T1440] loop0: partition table partially beyond EOD, truncated [ 1193.023715][ T978] loop4: detected capacity change from 0 to 264192 [ 1193.030692][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1193.043253][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1193.044988][ T979] loop5: detected capacity change from 0 to 264192 [ 1193.051919][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:43:10 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c7402"], 0x8c}}, 0x0) 06:43:10 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa5effd0000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1193.064735][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1193.065666][ T978] loop4: p1 < > p2 p3 p4 [ 1193.074737][ T984] loop1: detected capacity change from 0 to 264192 [ 1193.083188][ T978] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1193.092858][ T978] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:43:10 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0e02000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1193.124217][ T1440] loop0: p1 < > p2 p3 p4 [ 1193.128611][ T1440] loop0: partition table partially beyond EOD, truncated [ 1193.135779][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1193.141767][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1193.149628][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1193.157348][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:10 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500003f00000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:10 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa50000000e000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1193.180831][ T985] loop4: detected capacity change from 0 to 264192 06:43:10 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c7a02"], 0x8c}}, 0x0) [ 1193.245729][ T985] loop4: p1 < > p2 p3 p4 [ 1193.250605][ T985] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1193.259791][ T985] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1193.270073][ T1440] loop0: p1 < > p2 p3 p4 [ 1193.274413][ T1440] loop0: partition table partially beyond EOD, truncated [ 1193.281615][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1193.287634][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1193.295250][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1193.302792][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:10 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700000004060063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:43:10 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa5fffe0000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:10 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0f02000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1193.339610][ T1440] loop4: p1 < > p2 p3 p4 [ 1193.344488][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1193.354940][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1193.373530][ T1001] loop1: detected capacity change from 0 to 264192 [ 1193.376704][ T1002] loop5: detected capacity change from 0 to 264192 06:43:10 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500004000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:10 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa50000000f000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:10 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0003"], 0x8c}}, 0x0) 06:43:10 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c1002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:43:10 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa5feff0000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1193.468561][ T1440] loop0: p1 < > p2 p3 p4 [ 1193.473025][ T1440] loop0: partition table partially beyond EOD, truncated [ 1193.480169][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1193.486156][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1193.504362][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1193.512096][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1193.542925][ T1014] loop4: detected capacity change from 0 to 264192 [ 1193.550689][ T1440] loop0: p1 < > p2 p3 p4 [ 1193.555081][ T1440] loop0: partition table partially beyond EOD, truncated [ 1193.562181][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1193.568244][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1193.575851][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1193.583304][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1193.595170][ T1014] loop4: p1 < > p2 p3 p4 [ 1193.600098][ T1014] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1193.607902][ T1014] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1193.617661][ T1440] loop4: p1 < > p2 p3 p4 [ 1193.622517][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1193.630455][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:43:10 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c000f"], 0x8c}}, 0x0) [ 1193.655115][ T1019] loop5: detected capacity change from 0 to 264192 [ 1193.667504][ T1020] loop1: detected capacity change from 0 to 264192 [ 1193.674238][ T1017] loop4: detected capacity change from 0 to 264192 [ 1193.682069][ T1440] loop0: p1 < > p2 p3 p4 [ 1193.686595][ T1440] loop0: partition table partially beyond EOD, truncated [ 1193.693679][ T1440] loop0: p1 start 1 is beyond EOD, truncated 06:43:10 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500004800000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1193.699951][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1193.707689][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1193.716851][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1193.717476][ T1017] loop4: p1 < > p2 p3 p4 [ 1193.729170][ T1017] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1193.738753][ T1017] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:43:10 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000010000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:10 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700000000070063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1193.798149][ T1440] loop4: p1 < > p2 p3 p4 [ 1193.803858][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1193.812218][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:43:11 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa500000800000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:11 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c1102000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:43:11 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c001b"], 0x8c}}, 0x0) [ 1193.872615][ T1440] loop4: p1 < > p2 p3 p4 [ 1193.877607][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1193.885691][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1193.925107][ T1036] loop5: detected capacity change from 0 to 264192 [ 1193.942644][ T1440] loop0: p1 < > p2 p3 p4 [ 1193.946990][ T1440] loop0: partition table partially beyond EOD, truncated [ 1193.954154][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1193.960178][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1193.964407][ T1037] loop1: detected capacity change from 0 to 264192 [ 1193.968644][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1193.982036][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1193.999013][ T1440] loop0: p1 < > p2 p3 p4 [ 1194.003344][ T1440] loop0: partition table partially beyond EOD, truncated [ 1194.010531][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1194.016532][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated 06:43:11 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c1202000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:43:11 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500004c00000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:11 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa540000800000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1194.027242][ T1043] loop4: detected capacity change from 0 to 264192 [ 1194.034624][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1194.042739][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1194.057795][ T1043] loop4: p1 < > p2 p3 p4 [ 1194.064729][ T1043] loop4: p2 size 1073741824 extends beyond EOD, truncated 06:43:11 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000011000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:11 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0031"], 0x8c}}, 0x0) [ 1194.091901][ T1043] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1194.132087][ T1440] loop0: p1 < > p2 p3 p4 [ 1194.132229][ T1050] loop4: detected capacity change from 0 to 264192 [ 1194.136495][ T1440] loop0: partition table partially beyond EOD, truncated [ 1194.150098][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1194.156141][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1194.163720][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1194.171587][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1194.171603][ T1050] loop4: p1 < > p2 p3 p4 [ 1194.184726][ T1050] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1194.192534][ T1050] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1194.208044][ T1440] loop0: p1 < > p2 p3 p4 [ 1194.212520][ T1440] loop0: partition table partially beyond EOD, truncated [ 1194.219676][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1194.225667][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1194.233263][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:43:11 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700000000080063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:43:11 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0003"], 0x8c}}, 0x0) 06:43:11 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c2502000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:43:11 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa500002000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1194.240801][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1194.250494][ T1058] loop5: detected capacity change from 0 to 264192 [ 1194.259943][ T1061] loop1: detected capacity change from 0 to 264192 06:43:11 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500006800000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:11 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000012000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1194.304251][ T1440] loop4: p1 < > p2 p3 p4 [ 1194.309103][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1194.316569][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1194.391692][ T1440] loop0: p1 < > p2 p3 p4 [ 1194.396136][ T1440] loop0: partition table partially beyond EOD, truncated [ 1194.403228][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1194.409251][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1194.416980][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1194.424417][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1194.439646][ T1440] loop0: p1 < > p2 p3 p4 [ 1194.443964][ T1440] loop0: partition table partially beyond EOD, truncated [ 1194.451219][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1194.457260][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1194.464839][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1194.472491][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1194.521173][ T1070] loop4: detected capacity change from 0 to 264192 [ 1194.523184][ T1440] loop0: p1 < > p2 p3 p4 [ 1194.532120][ T1440] loop0: partition table partially beyond EOD, truncated [ 1194.539246][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1194.545273][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1194.552763][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1194.561220][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:11 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0008"], 0x8c}}, 0x0) [ 1194.567921][ T1070] loop4: p1 < > p2 p3 p4 [ 1194.573540][ T1070] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1194.589152][ T1070] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1194.609173][ T1440] loop0: p1 < > p2 p3 p4 [ 1194.613782][ T1440] loop0: partition table partially beyond EOD, truncated 06:43:11 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c2c02000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1194.620955][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1194.626988][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1194.634708][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1194.647237][ T1082] loop5: detected capacity change from 0 to 264192 [ 1194.650641][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1194.658157][ T1077] loop4: detected capacity change from 0 to 264192 06:43:11 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa500004000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1194.669135][ T1440] loop0: p1 < > p2 p3 p4 [ 1194.673511][ T1440] loop0: partition table partially beyond EOD, truncated [ 1194.680735][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1194.686753][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1194.694291][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1194.700608][ T1083] loop1: detected capacity change from 0 to 264192 [ 1194.701876][ T1077] loop4: p1 < > p2 p3 p4 [ 1194.710718][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:11 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500006c00000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:11 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700000000090063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1194.712829][ T1077] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1194.727237][ T1077] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1194.759809][ T1440] loop4: p1 < > p2 p3 p4 [ 1194.764632][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated 06:43:11 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000020000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1194.772184][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:43:11 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c000f"], 0x8c}}, 0x0) 06:43:12 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa57ffff000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1194.833642][ T1440] loop4: p1 < > p2 p3 p4 [ 1194.839413][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1194.847191][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:43:12 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c4802000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1194.900243][ T1440] loop0: p1 < > p2 p3 p4 [ 1194.904662][ T1440] loop0: partition table partially beyond EOD, truncated [ 1194.911762][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1194.917777][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1194.926275][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1194.933790][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1194.950157][ T1440] loop0: p1 < > p2 p3 p4 [ 1194.954540][ T1440] loop0: partition table partially beyond EOD, truncated [ 1194.961857][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1194.967845][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1194.975977][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1194.983645][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1194.993269][ T1098] loop5: detected capacity change from 0 to 264192 06:43:12 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500007400000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1195.037615][ T1102] loop4: detected capacity change from 0 to 264192 [ 1195.050122][ T1103] loop1: detected capacity change from 0 to 264192 [ 1195.076193][ T1102] loop4: p1 < > p2 p3 p4 [ 1195.081074][ T1102] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1195.088861][ T1102] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1195.102289][ T1102] ================================================================== [ 1195.110381][ T1102] BUG: KCSAN: data-race in drop_nlink / vfs_getattr_nosec [ 1195.114192][ T1440] loop4: p1 < > p2 p3 p4 [ 1195.117495][ T1102] [ 1195.117502][ T1102] write to 0xffff888104eb90c0 of 4 bytes by task 21 on cpu 0: [ 1195.117518][ T1102] drop_nlink+0x37/0x90 [ 1195.122547][ T1440] loop4: p2 size 1073741824 extends beyond EOD, [ 1195.124153][ T1102] shmem_unlink+0x17b/0x1a0 [ 1195.131616][ T1440] truncated [ 1195.135728][ T1102] vfs_unlink+0x257/0x450 [ 1195.142997][ T1440] loop4: p3 size 1912633224 extends beyond EOD, [ 1195.146529][ T1102] devtmpfs_work_loop+0x87c/0x930 [ 1195.146552][ T1102] devtmpfsd+0x3f/0x40 [ 1195.149640][ T1440] truncated [ 1195.163648][ T1440] loop0: p1 < > p2 p3 p4 [ 1195.165247][ T1102] kthread+0x2c7/0x2e0 [ 1195.165271][ T1102] ret_from_fork+0x1f/0x30 [ 1195.169320][ T1440] loop0: partition table partially beyond EOD, [ 1195.172405][ T1102] [ 1195.172411][ T1102] read to 0xffff888104eb90c0 of 4 bytes by task 1102 on cpu 1: [ 1195.176723][ T1440] truncated [ 1195.180743][ T1102] vfs_getattr_nosec+0x1c1/0x2f0 [ 1195.185429][ T1440] loop0: p1 start 1 is beyond EOD, [ 1195.191439][ T1102] vfs_statx+0x138/0x2a0 [ 1195.193744][ T1440] truncated [ 1195.193749][ T1440] loop0: p2 size 1073741824 extends beyond EOD, [ 1195.201254][ T1102] __se_sys_newstat+0x5d/0x250 [ 1195.201277][ T1102] __x64_sys_newstat+0x2d/0x40 [ 1195.204377][ T1440] truncated [ 1195.205391][ T1440] loop0: p3 size 1912633224 extends beyond EOD, [ 1195.209287][ T1102] do_syscall_64+0x44/0xd0 [ 1195.214474][ T1440] truncated [ 1195.214940][ T1440] loop0: p4 size 32768 extends beyond EOD, [ 1195.218688][ T1102] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1195.218719][ T1102] [ 1195.221796][ T1440] truncated [ 1195.271762][ T1102] value changed: 0x00000001 -> 0x00000000 [ 1195.277465][ T1102] [ 1195.279780][ T1102] Reported by Kernel Concurrency Sanitizer on: 06:43:12 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c001b"], 0x8c}}, 0x0) [ 1195.285912][ T1102] CPU: 1 PID: 1102 Comm: syz-executor.4 Not tainted 5.15.0-syzkaller #0 [ 1195.294232][ T1102] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1195.304276][ T1102] ================================================================== 06:43:12 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000025000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1195.358546][ T1106] loop4: detected capacity change from 0 to 264192 [ 1195.364873][ T1116] __nla_validate_parse: 48 callbacks suppressed [ 1195.365028][ T1116] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1195.371584][ T1440] loop0: p1 < > p2 p3 p4 [ 1195.384990][ T1440] loop0: partition table partially beyond EOD, truncated [ 1195.392040][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1195.398016][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated 06:43:12 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa500000001000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1195.405793][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1195.413359][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1195.418804][ T1121] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1195.441154][ T1106] loop4: p1 < > p2 p3 p4 [ 1195.446077][ T1106] loop4: p2 size 1073741824 extends beyond EOD, truncated 06:43:12 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c4c02000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:43:12 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff07000000000a0063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1195.454381][ T1106] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1195.456758][ T1440] loop0: p1 < > p2 p3 p4 [ 1195.465874][ T1440] loop0: partition table partially beyond EOD, truncated [ 1195.472984][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1195.478966][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1195.486481][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1195.494048][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:12 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0031"], 0x8c}}, 0x0) [ 1195.515027][ T1440] loop4: p1 < > p2 p3 p4 [ 1195.519809][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1195.527381][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1195.562075][ T1126] loop5: detected capacity change from 0 to 264192 [ 1195.612773][ T1128] loop1: detected capacity change from 0 to 264192 [ 1195.622748][ T1440] loop0: p1 < > p2 p3 p4 [ 1195.627114][ T1440] loop0: partition table partially beyond EOD, truncated [ 1195.634198][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1195.640304][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1195.648013][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1195.656532][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:12 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500007a00000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:12 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa500000002000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1195.692065][ T1440] loop0: p1 < > p2 p3 p4 [ 1195.696470][ T1440] loop0: partition table partially beyond EOD, truncated [ 1195.702054][ T1133] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1195.703565][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1195.718820][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1195.726477][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1195.732984][ T1138] loop4: detected capacity change from 0 to 264192 06:43:12 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0002"], 0xf}}, 0x0) 06:43:12 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa50000003f000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:12 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c5802000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1195.733938][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1195.755236][ T1138] loop4: p1 < > p2 p3 p4 [ 1195.768522][ T1138] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1195.780477][ T1138] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:43:12 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa500000402000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1195.825047][ T1145] loop5: detected capacity change from 0 to 264192 [ 1195.842596][ T1142] loop4: detected capacity change from 0 to 264192 [ 1195.873953][ T1440] loop0: p1 < > p2 p3 p4 [ 1195.878329][ T1440] loop0: partition table partially beyond EOD, truncated [ 1195.885413][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1195.891418][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1195.899345][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1195.900521][ T1142] loop4: p1 < > p2 p3 p4 [ 1195.908209][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:13 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500008100000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:13 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0002"], 0x10}}, 0x0) [ 1195.911308][ T1142] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1195.926467][ T1142] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1195.964057][ T1153] loop1: detected capacity change from 0 to 264192 06:43:13 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff07000000000b0063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:43:13 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c6002000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1195.970296][ T1154] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1195.981645][ T1440] loop4: p1 < > p2 p3 p4 [ 1195.986912][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1195.996860][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1195.997963][ T1157] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.2'. 06:43:13 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000040000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1196.046751][ T1440] loop0: p1 < > p2 p3 p4 [ 1196.051163][ T1440] loop0: partition table partially beyond EOD, truncated [ 1196.058314][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1196.064283][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1196.072028][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1196.081728][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:13 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa500000003000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1196.109796][ T1440] loop4: p1 < > p2 p3 p4 [ 1196.116257][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1196.123937][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:43:13 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0002"], 0x24}}, 0x0) [ 1196.152804][ T1163] loop5: detected capacity change from 0 to 264192 [ 1196.168287][ T1440] loop0: p1 < > p2 p3 p4 [ 1196.172617][ T1440] loop0: partition table partially beyond EOD, truncated [ 1196.179711][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1196.185712][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1196.193242][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1196.198673][ T1167] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1196.200719][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1196.225483][ T1171] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1196.233253][ T1172] loop1: detected capacity change from 0 to 264192 06:43:13 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c6802000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:43:13 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500009000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1196.251519][ T1440] loop0: p1 < > p2 p3 p4 [ 1196.255943][ T1440] loop0: partition table partially beyond EOD, truncated [ 1196.262984][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1196.269062][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1196.277007][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1196.284557][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:13 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500080040000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1196.301854][ T1440] loop0: p1 < > p2 p3 p4 [ 1196.306195][ T1440] loop0: partition table partially beyond EOD, truncated [ 1196.313290][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1196.319275][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1196.320375][ T1174] loop4: detected capacity change from 0 to 264192 [ 1196.327020][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1196.341300][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:13 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa500000004000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1196.366139][ T1440] loop4: p1 < > p2 p3 p4 [ 1196.371559][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1196.379420][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1196.388596][ T1440] loop4: p1 < > p2 p3 p4 [ 1196.393388][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1196.400957][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:43:13 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0002"], 0xc0}}, 0x0) [ 1196.417944][ T1174] loop4: p1 < > p2 p3 p4 [ 1196.422847][ T1174] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1196.431589][ T1174] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1196.448198][ T1440] loop0: p1 < > p2 p3 p4 [ 1196.452529][ T1440] loop0: partition table partially beyond EOD, truncated [ 1196.459660][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1196.465700][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1196.473218][ T1182] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1196.476974][ T1183] loop5: detected capacity change from 0 to 264192 [ 1196.484046][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1196.496838][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1196.506560][ T1177] loop4: detected capacity change from 0 to 264192 06:43:13 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c6c02000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1196.522237][ T1189] netlink: 92 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1196.533534][ T1440] loop0: p1 < > p2 p3 p4 [ 1196.537914][ T1440] loop0: partition table partially beyond EOD, truncated [ 1196.545011][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1196.551111][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1196.558862][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1196.566426][ T1177] loop4: p1 < > p2 p3 p4 06:43:13 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500059f00000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1196.566711][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1196.576262][ T1177] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1196.590609][ T1177] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:43:13 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff07000000000c0063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:43:13 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa500000005000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1196.623695][ T1191] loop1: detected capacity change from 0 to 264192 [ 1196.633575][ T1440] loop4: p1 < > p2 p3 p4 [ 1196.638827][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1196.646410][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:43:13 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000048000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1196.691788][ T1440] loop0: p1 < > p2 p3 p4 [ 1196.696164][ T1440] loop0: partition table partially beyond EOD, truncated [ 1196.703381][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1196.709390][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1196.717490][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1196.718193][ T1194] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1196.725298][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:13 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0002"], 0xec0}}, 0x0) [ 1196.753400][ T1440] loop4: p1 < > p2 p3 p4 [ 1196.758611][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1196.767246][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1196.825329][ T1440] loop0: p1 < > p2 p3 p4 [ 1196.829785][ T1440] loop0: partition table partially beyond EOD, truncated [ 1196.837096][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1196.843066][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1196.852492][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1196.860083][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:14 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c7402000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1196.890522][ T1203] loop5: detected capacity change from 0 to 264192 [ 1196.894997][ T1440] loop0: p1 < > p2 p3 p4 [ 1196.901450][ T1440] loop0: partition table partially beyond EOD, truncated [ 1196.908803][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1196.914791][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1196.922356][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1196.932047][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:14 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa50005c500000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1196.976785][ T1440] loop0: p1 < > p2 p3 p4 [ 1196.978455][ T1207] loop4: detected capacity change from 0 to 264192 [ 1196.981277][ T1440] loop0: partition table partially beyond EOD, truncated [ 1196.994852][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1197.000864][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1197.008673][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1197.017655][ T1207] loop4: p1 < > p2 p3 p4 06:43:14 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa500000006000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1197.021740][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1197.022547][ T1207] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1197.040470][ T1207] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1197.048831][ T1440] loop0: p1 < > p2 p3 p4 [ 1197.053158][ T1440] loop0: partition table partially beyond EOD, truncated [ 1197.054984][ T1210] loop1: detected capacity change from 0 to 264192 [ 1197.060287][ T1440] loop0: p1 start 1 is beyond EOD, truncated 06:43:14 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0002"], 0x33fe0}}, 0x0) [ 1197.072743][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1197.080928][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1197.088586][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1197.126451][ T1209] loop4: detected capacity change from 0 to 264192 [ 1197.160590][ T1209] loop4: p1 < > p2 p3 p4 06:43:14 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa50000004c000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1197.171060][ T1209] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1197.182178][ T1209] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1197.193576][ T1440] loop0: p1 < > p2 p3 p4 [ 1197.198073][ T1440] loop0: partition table partially beyond EOD, truncated [ 1197.205186][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1197.211163][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1197.219089][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:43:14 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c7a02000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:43:14 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff07000000000d0063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:43:14 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa500000406000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1197.224651][ T1221] loop5: detected capacity change from 0 to 264192 [ 1197.226726][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1197.263850][ T1440] loop4: p1 < > p2 p3 p4 06:43:14 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500fffe00000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:14 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0002"], 0x2000034c}}, 0x0) [ 1197.271279][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1197.279079][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1197.330046][ T1227] loop1: detected capacity change from 0 to 264192 [ 1197.344581][ T1440] loop0: p1 < > p2 p3 p4 [ 1197.348967][ T1440] loop0: partition table partially beyond EOD, truncated [ 1197.356117][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1197.362089][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1197.369623][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1197.377848][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1197.400616][ T1440] loop0: p1 < > p2 p3 p4 [ 1197.404983][ T1440] loop0: partition table partially beyond EOD, truncated [ 1197.412037][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1197.418046][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1197.425788][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1197.433939][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1197.441913][ T1236] loop5: detected capacity change from 0 to 264192 06:43:14 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0002"], 0x7ffff000}}, 0x0) 06:43:14 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0003000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:43:14 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000068000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:14 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa500000008000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1197.470531][ T1241] loop4: detected capacity change from 0 to 264192 [ 1197.505166][ T1440] loop4: p1 < > p2 p3 p4 [ 1197.510071][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated 06:43:14 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5000fff00000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1197.517649][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1197.527513][ T1241] loop4: p1 < > p2 p3 p4 [ 1197.532258][ T1241] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1197.540197][ T1241] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1197.558022][ T1440] loop0: p1 < > p2 p3 p4 [ 1197.562417][ T1440] loop0: partition table partially beyond EOD, truncated [ 1197.569684][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1197.575789][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1197.583869][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1197.592069][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1197.602488][ T1242] loop4: detected capacity change from 0 to 264192 [ 1197.611404][ T1440] loop0: p1 < > p2 p3 p4 [ 1197.615774][ T1440] loop0: partition table partially beyond EOD, truncated [ 1197.622995][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1197.629032][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1197.639344][ T1249] loop1: detected capacity change from 0 to 264192 [ 1197.650007][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:43:14 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c000a000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:43:14 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0002"], 0xfffffdef}}, 0x0) [ 1197.667580][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1197.675286][ T1242] loop4: p1 < > p2 p3 p4 [ 1197.681250][ T1242] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1197.690058][ T1242] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1197.700066][ T1256] loop5: detected capacity change from 0 to 264192 06:43:14 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff07000000000e0063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:43:14 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa50000000a000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:14 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500feff00000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:14 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa50000006c000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1197.736523][ T1440] loop4: p1 < > p2 p3 p4 [ 1197.741956][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1197.750591][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:43:14 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0002"], 0x8c}, 0x2}, 0x0) [ 1197.796172][ T1440] loop0: p1 < > p2 p3 p4 [ 1197.800518][ T1440] loop0: partition table partially beyond EOD, truncated [ 1197.807626][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1197.813757][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1197.821538][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1197.831554][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:15 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c000f000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1197.858278][ T1440] loop4: p1 < > p2 p3 p4 [ 1197.863073][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1197.871233][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1197.885462][ T1440] loop0: p1 < > p2 p3 p4 [ 1197.889796][ T1440] loop0: partition table partially beyond EOD, truncated [ 1197.896961][ T1440] loop0: p1 start 1 is beyond EOD, truncated 06:43:15 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa50000000b000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1197.902938][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1197.911226][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1197.918879][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1197.943122][ T1440] loop0: p1 < > p2 p3 p4 [ 1197.947539][ T1440] loop0: partition table partially beyond EOD, truncated [ 1197.954659][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1197.960629][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1197.968337][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1197.975838][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1197.995973][ T1272] loop5: detected capacity change from 0 to 264192 [ 1197.997083][ T1273] loop1: detected capacity change from 0 to 264192 06:43:15 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0002"], 0x8c}, 0x3}, 0x0) [ 1198.010271][ T1440] loop0: p1 < > p2 p3 p4 [ 1198.014675][ T1440] loop0: partition table partially beyond EOD, truncated [ 1198.015285][ T1274] loop4: detected capacity change from 0 to 264192 [ 1198.021784][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1198.034192][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1198.041732][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1198.049486][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1198.077781][ T1274] loop4: p1 < > p2 p3 p4 [ 1198.083423][ T1274] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1198.091398][ T1274] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:43:15 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500f80704000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:15 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000074000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:15 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0064000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1198.124992][ T1440] loop0: p1 < > p2 p3 p4 [ 1198.129344][ T1440] loop0: partition table partially beyond EOD, truncated [ 1198.136593][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1198.142575][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1198.146125][ T1278] loop4: detected capacity change from 0 to 264192 [ 1198.151022][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1198.163777][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:15 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa500000018000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:15 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff07000000000f0063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:43:15 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0002"], 0x8c}, 0x8}, 0x0) [ 1198.205345][ T1440] loop4: p1 < > p2 p3 p4 [ 1198.210330][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1198.217994][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1198.226984][ T1278] loop4: p1 < > p2 p3 p4 [ 1198.231599][ T1278] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1198.239886][ T1278] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1198.283033][ T1291] loop5: detected capacity change from 0 to 264192 [ 1198.294658][ T1292] loop1: detected capacity change from 0 to 264192 [ 1198.305593][ T1440] loop0: p1 < > p2 p3 p4 [ 1198.309924][ T1440] loop0: partition table partially beyond EOD, truncated [ 1198.317061][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1198.323021][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated 06:43:15 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500ff0704000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1198.330815][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1198.339203][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:15 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0003000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:43:15 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa50000007a000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:15 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa500000026000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1198.379355][ T1440] loop4: p1 < > p2 p3 p4 [ 1198.384550][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1198.393080][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:43:15 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0002"], 0x8c}, 0xa}, 0x0) [ 1198.447875][ T1440] loop0: p1 < > p2 p3 p4 [ 1198.452226][ T1440] loop0: partition table partially beyond EOD, truncated [ 1198.459452][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1198.465457][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1198.473063][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1198.481581][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1198.514334][ T1306] loop5: detected capacity change from 0 to 264192 [ 1198.523936][ T1307] loop4: detected capacity change from 0 to 264192 [ 1198.545785][ T1440] loop0: p1 < > p2 p3 p4 [ 1198.547008][ T1312] loop1: detected capacity change from 0 to 264192 [ 1198.550157][ T1440] loop0: partition table partially beyond EOD, truncated 06:43:15 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c000a000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1198.563725][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1198.569785][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1198.569996][ T1307] loop4: p1 < > p2 p3 p4 [ 1198.577461][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1198.589041][ T1307] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1198.589191][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1198.601455][ T1307] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:43:15 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000804000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:15 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5ffffff80000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:15 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa50000003f000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:15 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0002"], 0x8c}, 0xf}, 0x0) [ 1198.669921][ T1440] loop0: p1 < > p2 p3 p4 [ 1198.674283][ T1440] loop0: partition table partially beyond EOD, truncated [ 1198.681386][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1198.687371][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1198.695706][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1198.703713][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1198.709111][ T1315] loop4: detected capacity change from 0 to 264192 [ 1198.786108][ T1440] loop4: p1 < > p2 p3 p4 [ 1198.790898][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1198.798473][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1198.808314][ T1440] loop4: p1 < > p2 p3 p4 [ 1198.813079][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1198.813440][ T1324] loop1: detected capacity change from 0 to 264192 [ 1198.820657][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1198.837909][ T1315] loop4: p1 < > p2 p3 p4 [ 1198.838122][ T1326] loop5: detected capacity change from 0 to 264192 [ 1198.845866][ T1315] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1198.858158][ T1315] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1198.880292][ T1440] loop0: p1 < > p2 p3 p4 [ 1198.884654][ T1440] loop0: partition table partially beyond EOD, truncated [ 1198.891843][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1198.898173][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1198.905712][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1198.913177][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:16 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700000000100063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:43:16 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c000f000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:43:16 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0002"], 0x8c}, 0x25}, 0x0) 06:43:16 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa50000059f000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:16 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000008000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:16 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa500000040000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1198.952997][ T1440] loop0: p1 < > p2 p3 p4 [ 1198.957374][ T1440] loop0: partition table partially beyond EOD, truncated [ 1198.964461][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1198.970505][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1198.978528][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1198.986595][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:16 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0064000000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1199.002732][ T1440] loop4: p1 < > p2 p3 p4 [ 1199.007555][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1199.015139][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:43:16 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0002"], 0x8c}, 0x64}, 0x0) [ 1199.075360][ T1353] loop1: detected capacity change from 0 to 264192 [ 1199.086133][ T1440] loop0: p1 < > p2 p3 p4 [ 1199.090602][ T1440] loop0: partition table partially beyond EOD, truncated [ 1199.097766][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1199.103131][ T1355] loop5: detected capacity change from 0 to 264192 [ 1199.103728][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1199.107504][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:43:16 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa500080040000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:16 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500400008000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1199.125040][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1199.162536][ T1359] loop4: detected capacity change from 0 to 264192 06:43:16 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5000005c5000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:16 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0002020000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1199.188917][ T1359] loop4: p1 < > p2 p3 p4 [ 1199.194101][ T1359] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1199.203161][ T1440] loop0: p1 < > p2 p3 p4 [ 1199.203476][ T1359] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1199.207655][ T1440] loop0: partition table partially beyond EOD, truncated [ 1199.221860][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1199.227851][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1199.236205][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1199.244010][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1199.279582][ T1440] loop0: p1 < > p2 p3 p4 [ 1199.281415][ T1364] loop4: detected capacity change from 0 to 264192 [ 1199.283947][ T1440] loop0: partition table partially beyond EOD, truncated [ 1199.297665][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1199.303698][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1199.311294][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1199.315161][ T1364] loop4: p1 < > p2 p3 p4 [ 1199.318878][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1199.340689][ T1364] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1199.349325][ T1364] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1199.352534][ T1440] loop0: p1 < > p2 p3 p4 [ 1199.360820][ T1440] loop0: partition table partially beyond EOD, truncated [ 1199.368003][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1199.374091][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1199.381698][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:43:16 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700000000110063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:43:16 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0002"], 0x8c}, 0x7ffffff2}, 0x0) [ 1199.389212][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1199.408492][ T1440] loop4: p1 < > p2 p3 p4 [ 1199.413142][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1199.420715][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:43:16 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa500000073000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1199.460572][ T1373] loop5: detected capacity change from 0 to 264192 [ 1199.470744][ T1440] loop0: p1 < > p2 p3 p4 [ 1199.475153][ T1440] loop0: partition table partially beyond EOD, truncated [ 1199.482271][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1199.488368][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1199.496090][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1199.503564][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:16 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0002030000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1199.507516][ T1374] loop1: detected capacity change from 0 to 264192 [ 1199.524310][ T1440] loop4: p1 < > p2 p3 p4 [ 1199.529281][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1199.536929][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:43:16 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000408000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:16 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5ffffffc9000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1199.575271][ T1440] loop0: p1 < > p2 p3 p4 [ 1199.579618][ T1440] loop0: partition table partially beyond EOD, truncated [ 1199.586891][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1199.592866][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1199.600295][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1199.608076][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:16 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0002"], 0x8c}, 0x7ffffff8}, 0x0) 06:43:16 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa500f0ff7f000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1199.642377][ T1440] loop0: p1 < > p2 p3 p4 [ 1199.646750][ T1440] loop0: partition table partially beyond EOD, truncated [ 1199.653799][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1199.659820][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1199.669335][ T1385] loop4: detected capacity change from 0 to 264192 [ 1199.671094][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1199.683431][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1199.715194][ T1440] loop4: p1 < > p2 p3 p4 [ 1199.720028][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1199.727662][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1199.737667][ T1385] loop4: p1 < > p2 p3 p4 [ 1199.742642][ T1385] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1199.750442][ T1385] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1199.765175][ T1390] loop5: detected capacity change from 0 to 264192 [ 1199.797773][ T1389] loop4: detected capacity change from 0 to 264192 [ 1199.806879][ T1440] loop0: p1 < > p2 p3 p4 06:43:16 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0002040000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:43:17 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000040000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:17 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0002"], 0x8c}, 0x7ffffff9}, 0x0) [ 1199.811243][ T1440] loop0: partition table partially beyond EOD, truncated [ 1199.818330][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1199.824393][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1199.826268][ T1397] loop1: detected capacity change from 0 to 264192 [ 1199.833017][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1199.845850][ T1389] loop4: p1 < > p2 p3 p4 [ 1199.846877][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1199.850737][ T1389] loop4: p2 size 1073741824 extends beyond EOD, truncated 06:43:17 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5fffffff6000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1199.883075][ T1389] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1199.892497][ T1440] loop0: p1 < > p2 p3 p4 [ 1199.896948][ T1440] loop0: partition table partially beyond EOD, truncated [ 1199.904017][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1199.909988][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1199.918108][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1199.925724][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:17 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700000000120063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:43:17 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa500000380000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1199.943357][ T1440] loop4: p1 < > p2 p3 p4 [ 1199.948242][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1199.956518][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:43:17 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0002050000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1200.027303][ T1440] loop0: p1 < > p2 p3 p4 [ 1200.031651][ T1440] loop0: partition table partially beyond EOD, truncated [ 1200.038758][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1200.044733][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1200.052390][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1200.059986][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:17 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0002"], 0x8c}, 0x1, 0x2}, 0x0) [ 1200.079646][ T1417] loop5: detected capacity change from 0 to 264192 [ 1200.080204][ T1416] loop1: detected capacity change from 0 to 264192 [ 1200.102849][ T1440] loop0: p1 < > p2 p3 p4 [ 1200.107224][ T1440] loop0: partition table partially beyond EOD, truncated [ 1200.114456][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1200.120438][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated 06:43:17 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa500000083000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1200.128155][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1200.136265][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1200.157558][ T1423] loop4: detected capacity change from 0 to 264192 06:43:17 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000081000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:17 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5000407f8000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1200.185101][ T1423] loop4: p1 < > p2 p3 p4 [ 1200.185894][ T1440] loop0: p1 < > p2 p3 p4 [ 1200.193848][ T1440] loop0: partition table partially beyond EOD, truncated [ 1200.200951][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1200.206994][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1200.209496][ T1423] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1200.216826][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1200.222726][ T1423] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:43:17 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0002060000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1200.230996][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1200.264106][ T1427] loop4: detected capacity change from 0 to 264192 [ 1200.271950][ T1440] loop0: p1 < > p2 p3 p4 [ 1200.276316][ T1440] loop0: partition table partially beyond EOD, truncated [ 1200.283403][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1200.289411][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1200.296898][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1200.305107][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1200.318801][ T1440] loop0: p1 < > p2 p3 p4 [ 1200.323225][ T1440] loop0: partition table partially beyond EOD, truncated [ 1200.330312][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1200.330588][ T1427] loop4: p1 < > p2 p3 p4 [ 1200.336391][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1200.337020][ T1440] loop0: p3 size 1912633224 extends beyond EOD, [ 1200.342941][ T1427] loop4: p2 size 1073741824 extends beyond EOD, [ 1200.347908][ T1440] truncated [ 1200.349131][ T1440] loop0: p4 size 32768 extends beyond EOD, [ 1200.354254][ T1427] truncated [ 1200.356447][ T1427] loop4: p3 size 1912633224 extends beyond EOD, [ 1200.360598][ T1440] truncated [ 1200.382152][ T1427] truncated 06:43:17 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0002"], 0x8c}, 0x1, 0x3}, 0x0) 06:43:17 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff07000000031d0063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1200.391535][ T1435] __nla_validate_parse: 24 callbacks suppressed [ 1200.391544][ T1435] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1200.428617][ T1440] loop4: p1 < > p2 p3 p4 [ 1200.433660][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1200.441889][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1200.481316][ T1441] loop1: detected capacity change from 0 to 264192 06:43:17 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa5ffffff85000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1200.495129][ T1443] loop5: detected capacity change from 0 to 264192 [ 1200.499582][ T1440] loop4: p1 < > p2 p3 p4 [ 1200.506577][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1200.514120][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:43:17 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5fffffdfd000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:17 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000090000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1200.553991][ T1440] loop0: p1 < > p2 p3 p4 [ 1200.558356][ T1440] loop0: partition table partially beyond EOD, truncated [ 1200.565451][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1200.571461][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1200.579563][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1200.590103][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:17 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0002070000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1200.613000][ T1440] loop0: p1 < > p2 p3 p4 [ 1200.617483][ T1440] loop0: partition table partially beyond EOD, truncated [ 1200.624600][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1200.630620][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1200.638523][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1200.646241][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:17 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0002"], 0x8c}, 0x1, 0x4}, 0x0) [ 1200.695097][ T1450] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1200.708049][ T1451] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1200.720467][ T1440] loop0: p1 < > p2 p3 p4 [ 1200.724858][ T1440] loop0: partition table partially beyond EOD, truncated [ 1200.732026][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1200.738740][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1200.749173][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1200.750152][ T1453] loop4: detected capacity change from 0 to 264192 [ 1200.756856][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1200.795090][ T1453] loop4: p1 < > p2 p3 p4 [ 1200.800970][ T1453] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1200.810730][ T1453] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1200.853020][ T1440] loop0: p1 < > p2 p3 p4 [ 1200.853968][ T1455] loop4: detected capacity change from 0 to 264192 [ 1200.857410][ T1440] loop0: partition table partially beyond EOD, truncated [ 1200.870972][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1200.871749][ T1459] loop1: detected capacity change from 0 to 264192 [ 1200.876959][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1200.891058][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:43:18 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa5fffffdef000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:18 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5fffffffe000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:18 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0002080000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1200.899027][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1200.899689][ T1455] loop4: p1 < > p2 p3 p4 [ 1200.912259][ T1455] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1200.924363][ T1461] loop5: detected capacity change from 0 to 264192 [ 1200.928535][ T1455] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:43:18 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff07000000021f0063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) 06:43:18 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000010000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1200.966408][ T1440] loop4: p1 < > p2 p3 p4 [ 1200.971256][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1200.979283][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1201.020648][ T1467] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1201.031076][ T1440] loop0: p1 < > p2 p3 p4 [ 1201.035434][ T1440] loop0: partition table partially beyond EOD, truncated [ 1201.042512][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1201.048520][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1201.056317][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:43:18 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0002"], 0x8c}, 0x1, 0x5}, 0x0) [ 1201.057089][ T1468] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1201.063821][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1201.086440][ T1440] loop4: p1 < > p2 p3 p4 [ 1201.091426][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1201.098921][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1201.168910][ T1440] loop0: p1 < > p2 p3 p4 [ 1201.173245][ T1440] loop0: partition table partially beyond EOD, truncated [ 1201.180327][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1201.186304][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1201.193761][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1201.201726][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:18 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa5fffffff6000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:18 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0002090000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1201.215716][ T1483] loop1: detected capacity change from 0 to 264192 [ 1201.227478][ T1484] loop5: detected capacity change from 0 to 264192 [ 1201.244098][ T1486] loop4: detected capacity change from 0 to 264192 06:43:18 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000020000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:18 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5000407ff000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1201.276573][ T1486] loop4: p1 < > p2 p3 p4 [ 1201.281386][ T1486] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1201.289118][ T1488] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1201.292458][ T1486] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1201.307466][ T1490] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1201.318880][ T1440] loop0: p1 < > p2 p3 p4 06:43:18 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0002"], 0x8c}, 0x1, 0x6}, 0x0) [ 1201.323224][ T1440] loop0: partition table partially beyond EOD, truncated [ 1201.330456][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1201.336512][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1201.343967][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1201.353512][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1201.356209][ T1489] loop4: detected capacity change from 0 to 264192 [ 1201.405243][ T1440] loop4: p1 < > p2 p3 p4 [ 1201.410021][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1201.417874][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1201.427639][ T1440] loop4: p1 < > p2 p3 p4 [ 1201.432437][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1201.440154][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1201.449711][ T1489] loop4: p1 < > p2 p3 p4 06:43:18 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa5fffffdfc000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1201.454487][ T1489] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1201.462506][ T1489] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1201.480546][ T1440] loop0: p1 < > p2 p3 p4 [ 1201.484916][ T1440] loop0: partition table partially beyond EOD, truncated [ 1201.492082][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1201.493891][ T1497] loop5: detected capacity change from 0 to 264192 06:43:18 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700000000200063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1201.498096][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1201.507148][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1201.520382][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1201.533100][ T1501] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1201.547905][ T1502] loop1: detected capacity change from 0 to 264192 06:43:18 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c00020a0000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:43:18 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0002"], 0x8c}, 0x1, 0x7}, 0x0) 06:43:18 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000004020000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1201.555779][ T1504] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1201.570178][ T1440] loop4: p1 < > p2 p3 p4 [ 1201.575025][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1201.582628][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:43:18 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000fff000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:18 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa5fffffdfd000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1201.635961][ T1440] loop0: p1 < > p2 p3 p4 [ 1201.640320][ T1440] loop0: partition table partially beyond EOD, truncated [ 1201.647374][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1201.653333][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1201.660956][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1201.668516][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1201.705631][ T1440] loop0: p1 < > p2 p3 p4 [ 1201.710045][ T1440] loop0: partition table partially beyond EOD, truncated [ 1201.716025][ T1511] netlink: 64 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1201.717200][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1201.732313][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1201.740728][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1201.748454][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated 06:43:18 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0002"], 0x8c}, 0x1, 0x8}, 0x0) 06:43:18 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c00020b0000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1201.750867][ T1515] loop4: detected capacity change from 0 to 264192 [ 1201.778389][ T1518] loop5: detected capacity change from 0 to 264192 [ 1201.795481][ T1440] loop4: p1 < > p2 p3 p4 [ 1201.800149][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1201.808083][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1201.817584][ T1515] loop4: p1 < > p2 p3 p4 [ 1201.822724][ T1515] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1201.830968][ T1515] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:43:19 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000030000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1201.867684][ T1522] loop1: detected capacity change from 0 to 264192 [ 1201.876115][ T1440] loop0: p1 < > p2 p3 p4 [ 1201.880482][ T1440] loop0: partition table partially beyond EOD, truncated [ 1201.884740][ T1519] loop4: detected capacity change from 0 to 264192 [ 1201.887705][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1201.900243][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1201.907870][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1201.915854][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1201.925062][ T1519] loop4: p1 < > p2 p3 p4 [ 1201.934669][ T1519] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1201.937003][ T1440] loop0: p1 < > p2 p3 p4 [ 1201.942471][ T1519] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1201.946305][ T1440] loop0: partition table partially beyond EOD, truncated [ 1201.946362][ T1440] loop0: p1 start 1 is beyond EOD, truncated 06:43:19 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5ffffefff000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:19 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') fchdir(r0) syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02010f00000001000000ff0700000002200063000800000000000000004000ffffffa500000000000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) [ 1201.966492][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1201.974051][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1201.988269][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1202.011543][ T1440] loop4: p1 < > p2 p3 p4 06:43:19 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa5fffffffe000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:19 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0002"], 0x8c}, 0x1, 0x9}, 0x0) 06:43:19 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c00020c0000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) [ 1202.017571][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1202.025454][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1202.086660][ T1440] loop0: p1 < > p2 p3 p4 [ 1202.090983][ T1440] loop0: partition table partially beyond EOD, truncated [ 1202.098224][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1202.104214][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1202.111834][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1202.119265][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1202.133382][ T1440] loop4: p1 < > p2 p3 p4 [ 1202.138361][ T1440] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1202.144187][ T1535] loop5: detected capacity change from 0 to 264192 [ 1202.147476][ T1440] loop4: p3 size 1912633224 extends beyond EOD, truncated 06:43:19 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa5effdffff000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:19 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0002"], 0x8c}, 0x1, 0xa}, 0x0) [ 1202.177924][ T1537] loop1: detected capacity change from 0 to 264192 06:43:19 executing program 5: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa500000000040000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) 06:43:19 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0f00"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c00020d0000000016000000000000000000000000000000000000001400060003000000000000"], 0x8c}}, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) close(0xffffffffffffffff) 06:43:19 executing program 1: syz_open_procfs(0x0, &(0x7f00000000c0)='map_files\x00') syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="0201eeffffff01000000ff0700000000000063000800000000000000004000ffffffa5ffefffff000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1202.252275][ T1440] loop0: p1 < > p2 p3 p4 [ 1202.256714][ T1440] loop0: partition table partially beyond EOD, truncated [ 1202.263769][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1202.269867][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1202.277495][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1202.285514][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1202.303137][ T1440] loop0: p1 < > p2 p3 p4 [ 1202.303539][ T1549] loop4: detected capacity change from 0 to 264192 [ 1202.307625][ T1440] loop0: partition table partially beyond EOD, truncated [ 1202.321231][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1202.327208][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1202.334997][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1202.342563][ T1549] loop4: p1 < > p2 p3 p4 [ 1202.342581][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1202.348124][ T1549] loop4: p2 size 1073741824 extends beyond EOD, truncated [ 1202.362621][ T1549] loop4: p3 size 1912633224 extends beyond EOD, truncated [ 1202.371716][ T1440] loop0: p1 < > p2 p3 p4 [ 1202.376105][ T1440] loop0: partition table partially beyond EOD, truncated [ 1202.383223][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1202.389210][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1202.396780][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated 06:43:19 executing program 0: syz_read_part_table(0x0, 0x1bf, &(0x7f0000000080)=[{&(0x7f0000000000)="02016300000001000000ff0700000000000063000800000000000000004000ffffffa5fcfdffff000000887700720030b5829237c300000000000080000055aa", 0x40, 0x1c0}]) [ 1202.404290][ T1440] loop0: p4 size 32768 extends beyond EOD, truncated [ 1202.431559][ T1550] loop4: detected capacity change from 0 to 264192 [ 1202.439623][ T1440] loop0: p1 < > p2 p3 p4 [ 1202.444041][ T1440] loop0: partition table partially beyond EOD, truncated 06:43:19 executing program 3: r0 = socket(0x11, 0x800000003, 0x0) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r0, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) r2 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000002c0)=ANY=[@ANYBLOB="8c00000024000b0400"/20, @ANYRES32=r1, @ANYBLOB="00000000ffffffff000000000a0001006e6574656d0000005c0002"], 0x8c}, 0x1, 0xb}, 0x0) [ 1202.451138][ T1440] loop0: p1 start 1 is beyond EOD, truncated [ 1202.457148][ T1440] loop0: p2 size 1073741824 extends beyond EOD, truncated [ 1202.472316][ T1558] loop5: detected capacity change from 0 to 264192 [ 1202.473501][ T1440] loop0: p3 size 1912633224 extends beyond EOD, truncated [ 1202.487766][ T1550] loop4: p1 < > p2 p3 p4 [ 1202.493620][ T1550] loop4: p2 size 1073741824 extends beyond EOD, truncated 06:43:19 executing program 2: socket(0x0, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000100)=@name, 0x10, 0x0}, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) sendmsg$NL80211_CMD_LEAVE_OCB(0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x11, 0x800000003, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000001800)={{0x0, 0x0, 0x0, 0x0, 0x369, 0xa3}, "", ['\x00', '\x00', '\x00', '\x00']}, 0x420) bind(r0, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a49