966] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 970.210957][ T4297] loop_reread_partitions: partition scan of loop4 () failed (rc=-16) [ 970.220041][ T4432] loop5: p1 p3 p4 [ 970.224608][ T4432] loop5: p1 size 11290111 extends beyond EOD, truncated [ 970.233517][ T4432] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 970.236612][ T4292] loop1: p1 p3 p4 [ 970.245574][ T4292] loop1: p1 size 11290111 extends beyond EOD, truncated [ 970.247028][ T1439] loop5: p1 p3 p4 [ 970.256597][ T1439] loop5: p1 size 11290111 extends beyond EOD, truncated [ 970.256722][ T4291] loop3: detected capacity change from 0 to 264192 [ 970.266278][ T4292] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 970.270925][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 970.291920][ T4291] loop3: p1 p3 p4 [ 970.295840][ T4291] loop3: p1 size 11290111 extends beyond EOD, truncated [ 970.303512][ T4291] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 970.330761][ T4515] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 22:52:45 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a6c0000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:45 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x9000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:45 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 970.337847][ T4292] loop1: detected capacity change from 0 to 90881 [ 970.359943][ T4549] loop5: detected capacity change from 0 to 241409 [ 970.383065][ T4292] loop1: p1 p3 p4 [ 970.386944][ T4292] loop1: p1 size 11290111 extends beyond EOD, truncated [ 970.395447][ T4292] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 970.396494][ T1439] loop5: p1 p3 p4 [ 970.406384][ T1439] loop5: p1 size 11290111 extends beyond EOD, truncated [ 970.414486][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 970.423579][ T1439] loop5: p1 p3 p4 22:52:45 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000055000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:45 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa90008000000000e0000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:45 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:45 executing program 3: syz_read_part_table(0xeeffffff00000000, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f00180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:45 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0xa000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 970.427610][ T1439] loop5: p1 size 11290111 extends beyond EOD, truncated [ 970.436713][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 970.445669][ T4549] loop5: p1 p3 p4 [ 970.453817][ T4549] loop5: p1 size 11290111 extends beyond EOD, truncated [ 970.456576][ T4626] loop3: detected capacity change from 0 to 264192 [ 970.463069][ T4627] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 22:52:45 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9e01}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:45 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb601}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:45 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:45 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0xb000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 970.471937][ T4628] loop4: detected capacity change from 0 to 90881 [ 970.482803][ T4549] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 970.506063][ T4626] loop3: p1 p3 p4 [ 970.510803][ T4626] loop3: p1 size 11290111 extends beyond EOD, truncated [ 970.519886][ T4726] loop1: detected capacity change from 0 to 90881 [ 970.520303][ T4626] loop3: p4 size 3674243072 extends beyond EOD, truncated 22:52:45 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a740000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:45 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:45 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 970.539676][ T4742] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 970.555039][ T4628] loop4: p1 p3 p4 [ 970.560937][ T4628] loop4: p1 size 11290111 extends beyond EOD, truncated [ 970.573406][ T1966] loop1: p1 p3 p4 [ 970.577300][ T1966] loop1: p1 size 11290111 extends beyond EOD, truncated [ 970.588217][ T1966] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 970.592595][ T4626] loop3: detected capacity change from 0 to 264192 [ 970.596445][ T4747] loop5: detected capacity change from 0 to 175873 [ 970.611429][ T4628] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 970.621642][ T4726] loop_reread_partitions: partition scan of loop1 () failed (rc=-16) [ 970.632026][ T4626] loop3: p1 p3 p4 22:52:45 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000156000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 970.635880][ T4626] loop3: p1 size 11290111 extends beyond EOD, truncated [ 970.650451][ T1439] loop5: p1 p3 p4 [ 970.652403][ T4626] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 970.654543][ T1439] loop5: p1 size 11290111 extends beyond EOD, truncated [ 970.670807][ T2932] udevd[2932]: inotify_add_watch(7, /dev/loop4p1, 10) failed: No such file or directory [ 970.681429][ T1906] udevd[1906]: inotify_add_watch(7, /dev/loop4p3, 10) failed: No such file or directory [ 970.692686][ T2931] udevd[2931]: inotify_add_watch(7, /dev/loop4p4, 10) failed: No such file or directory [ 970.704074][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 970.710264][ T4851] loop1: detected capacity change from 0 to 90881 [ 970.718276][ T4628] loop4: detected capacity change from 0 to 90881 [ 970.726861][ T4747] loop5: p1 p3 p4 [ 970.730647][ T4747] loop5: p1 size 11290111 extends beyond EOD, truncated [ 970.738884][ T4747] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 970.746930][ T4851] loop1: p1 p3 p4 [ 970.750784][ T4851] loop1: p1 size 11290111 extends beyond EOD, truncated [ 970.759692][ T4851] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 970.761792][ T4628] loop4: p1 p3 p4 [ 970.770655][ T4628] loop4: p1 size 11290111 extends beyond EOD, truncated [ 970.778732][ T4628] loop4: p4 size 3674243072 extends beyond EOD, truncated 22:52:45 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa90008000000000f0000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:45 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:45 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0xc000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:45 executing program 3: syz_read_part_table(0xf6ffffff00000000, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f00180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:45 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:45 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0xd000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 970.787499][ T4747] loop5: detected capacity change from 0 to 175873 [ 970.798669][ T4851] loop1: detected capacity change from 0 to 90881 [ 970.811412][ T4854] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 970.817394][ T4857] loop3: detected capacity change from 0 to 264192 [ 970.854149][ T4851] loop1: p1 p3 p4 [ 970.854289][ T1439] loop5: p1 p3 p4 [ 970.858051][ T4851] loop1: p1 size 11290111 extends beyond EOD, truncated [ 970.863501][ T1439] loop5: p1 size 11290111 extends beyond EOD, truncated [ 970.876679][ T4857] loop3: p1 p3 p4 [ 970.880925][ T4962] loop4: detected capacity change from 0 to 90881 [ 970.889331][ T4960] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 22:52:45 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 970.890212][ T4857] loop3: p1 size 11290111 extends beyond EOD, truncated [ 970.904246][ T4851] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 970.917207][ T4857] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 970.925735][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 970.935396][ T4747] loop5: p1 p3 p4 [ 970.939309][ T4747] loop5: p1 size 11290111 extends beyond EOD, truncated 22:52:45 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000256000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:45 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a7a0000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:45 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0xe000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 970.948643][ T4747] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 970.956453][ T4962] loop4: p1 p3 p4 [ 970.960451][ T4962] loop4: p1 size 11290111 extends beyond EOD, truncated [ 970.968696][ T4857] loop3: detected capacity change from 0 to 264192 [ 970.978090][ T4962] loop4: p4 size 3674243072 extends beyond EOD, truncated 22:52:45 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 971.003132][ T4857] loop3: p1 p3 p4 [ 971.007031][ T4857] loop3: p1 size 11290111 extends beyond EOD, truncated [ 971.007801][ T5070] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 971.014558][ T5072] loop1: detected capacity change from 0 to 90881 [ 971.036685][ T4857] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 971.043285][ T4962] loop4: detected capacity change from 0 to 90881 22:52:45 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 971.055642][ T5086] loop5: detected capacity change from 0 to 126721 [ 971.074065][ T1906] loop1: p1 p3 p4 [ 971.078006][ T1906] loop1: p1 size 11290111 extends beyond EOD, truncated [ 971.086286][ T1906] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 971.099041][ T5072] loop1: p1 p3 p4 [ 971.104941][ T5072] loop1: p1 size 11290111 extends beyond EOD, truncated [ 971.106492][ T4962] loop4: p1 p3 p4 [ 971.113348][ T5072] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 971.123726][ T4962] loop4: p1 size 11290111 extends beyond EOD, truncated [ 971.128766][ T1439] loop5: p1 p3 p4 [ 971.137709][ T1439] loop5: p1 size 11290111 extends beyond EOD, truncated [ 971.139588][ T4962] loop4: p4 size 3674243072 extends beyond EOD, truncated 22:52:46 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000100000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:46 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:46 executing program 3: syz_read_part_table(0xf9be000000000000, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f00180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:46 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 971.154429][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 971.164307][ T5086] loop5: p1 p3 p4 [ 971.168433][ T5086] loop5: p1 size 11290111 extends beyond EOD, truncated [ 971.176951][ T5072] loop1: detected capacity change from 0 to 90881 [ 971.177034][ T5086] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 971.194284][ T1439] loop5: p1 p3 p4 [ 971.199840][ T1439] loop5: p1 size 11290111 extends beyond EOD, truncated [ 971.208277][ T5183] loop3: detected capacity change from 0 to 264192 [ 971.215842][ T5072] loop1: p1 p3 p4 [ 971.219882][ T5072] loop1: p1 size 11290111 extends beyond EOD, truncated [ 971.230023][ T5184] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 971.230483][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 971.249992][ T5187] loop4: detected capacity change from 0 to 90881 22:52:46 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:46 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x11000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:46 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa900080000025f000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:46 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a900000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 971.256671][ T5072] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 971.265624][ T5183] loop3: p1 p3 p4 [ 971.269534][ T5183] loop3: p1 size 11290111 extends beyond EOD, truncated [ 971.277885][ T5183] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 971.293156][ T5187] loop4: p1 p3 p4 [ 971.297414][ T5187] loop4: p1 size 11290111 extends beyond EOD, truncated [ 971.324455][ T5294] loop5: detected capacity change from 0 to 264192 [ 971.334764][ T5292] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 971.335616][ T5187] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 971.357735][ T5183] loop3: detected capacity change from 0 to 264192 [ 971.363040][ T1439] loop5: p1 p3 p4 [ 971.365997][ T5304] loop1: detected capacity change from 0 to 90881 22:52:46 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 971.368094][ T1439] loop5: p1 size 11290111 extends beyond EOD, truncated [ 971.383724][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 971.394509][ T1439] loop5: p1 p3 p4 [ 971.398385][ T1439] loop5: p1 size 11290111 extends beyond EOD, truncated [ 971.402126][ T5183] loop3: p1 p3 p4 [ 971.406825][ T5304] loop1: p1 p3 p4 [ 971.409795][ T5183] loop3: p1 size 11290111 extends beyond EOD, truncated 22:52:46 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x12000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 971.414404][ T5304] loop1: p1 size 11290111 extends beyond EOD, truncated [ 971.430166][ T5187] loop4: detected capacity change from 0 to 90881 [ 971.437524][ T5183] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 971.441704][ T5304] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 971.447087][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 971.461131][ T5294] loop5: p1 p3 p4 [ 971.466279][ T5294] loop5: p1 size 11290111 extends beyond EOD, truncated 22:52:46 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:46 executing program 3: syz_read_part_table(0xfbffffff00000000, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f00180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 971.471836][ T5402] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 971.481607][ T5294] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 971.492220][ T5187] loop4: p1 p3 p4 [ 971.496141][ T5187] loop4: p1 size 11290111 extends beyond EOD, truncated [ 971.506589][ T5187] loop4: p4 size 3674243072 extends beyond EOD, truncated 22:52:46 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000110000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:46 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:46 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 971.526437][ T5304] loop1: detected capacity change from 0 to 90881 [ 971.549552][ T5294] loop5: detected capacity change from 0 to 264192 [ 971.551022][ T5507] loop3: detected capacity change from 0 to 264192 [ 971.568056][ T1906] loop1: p1 p3 p4 22:52:46 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:46 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000120000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 971.587564][ T1906] loop1: p1 size 11290111 extends beyond EOD, truncated [ 971.600547][ T5513] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 971.601844][ T1906] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 971.626992][ T5507] loop3: p1 p3 p4 [ 971.630965][ T5507] loop3: p1 size 11290111 extends beyond EOD, truncated [ 971.649080][ T5294] loop5: p1 p3 p4 [ 971.654533][ T5294] loop5: p1 size 11290111 extends beyond EOD, truncated [ 971.656172][ T5531] loop4: detected capacity change from 0 to 90881 [ 971.663613][ T5294] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 971.684263][ T5304] loop1: p1 p3 p4 [ 971.687828][ T5507] loop3: p4 size 3674243072 extends beyond EOD, truncated 22:52:46 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000ae10000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 971.689230][ T5304] loop1: p1 size 11290111 extends beyond EOD, truncated 22:52:46 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000060000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:46 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x27000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:46 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 971.723120][ T5531] loop4: p1 p3 p4 [ 971.724559][ T5304] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 971.727158][ T5531] loop4: p1 size 11290111 extends beyond EOD, truncated [ 971.748531][ T5531] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 971.800527][ T5623] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 971.812407][ T5621] loop5: detected capacity change from 0 to 264192 [ 971.817540][ T5507] loop3: detected capacity change from 0 to 264192 [ 971.835958][ T5531] loop4: detected capacity change from 0 to 90881 22:52:46 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x40000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:46 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 971.852878][ T5626] loop1: detected capacity change from 0 to 90881 [ 971.859737][ T5621] loop5: p1 p3 p4 [ 971.865940][ T2931] loop3: p1 p3 p4 [ 971.869805][ T2931] loop3: p1 size 11290111 extends beyond EOD, truncated [ 971.878246][ T5730] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 971.878801][ T5531] loop4: p1 p3 p4 [ 971.890017][ T5621] loop5: p1 size 11290111 extends beyond EOD, truncated [ 971.896051][ T2931] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 971.906650][ T5621] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 971.909564][ T5626] loop1: p1 p3 p4 [ 971.917212][ T5531] loop4: p1 size 11290111 extends beyond EOD, truncated [ 971.923443][ T5626] loop1: p1 size 11290111 extends beyond EOD, truncated [ 971.944358][ T5507] loop3: p1 p3 p4 [ 971.948322][ T5507] loop3: p1 size 11290111 extends beyond EOD, truncated [ 971.966475][ T5531] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 971.974341][ T5621] loop5: detected capacity change from 0 to 264192 [ 971.980525][ T5507] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 971.990472][ T5626] loop1: p4 size 3674243072 extends beyond EOD, truncated 22:52:46 executing program 3: syz_read_part_table(0xfdfdffff00000000, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f00180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:46 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x48000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:46 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:46 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa90008000000001c0000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 972.024088][ T1439] loop5: p1 p3 p4 [ 972.028123][ T1439] loop5: p1 size 11290111 extends beyond EOD, truncated [ 972.038107][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 972.039727][ T5626] loop1: detected capacity change from 0 to 90881 [ 972.053689][ T5836] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 972.067506][ T5621] loop5: p1 p3 p4 22:52:46 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a040200ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:46 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:46 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800002c61000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:46 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x48020000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 972.071477][ T5621] loop5: p1 size 11290111 extends beyond EOD, truncated [ 972.079369][ T5621] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 972.101788][ T5896] loop3: detected capacity change from 0 to 264192 [ 972.110044][ T5899] loop4: detected capacity change from 0 to 90881 [ 972.134624][ T5896] loop3: p1 p3 p4 [ 972.140070][ T2932] udevd[2932]: inotify_add_watch(7, /dev/loop4p1, 10) failed: No such file or directory [ 972.140259][ T1906] udevd[1906]: inotify_add_watch(7, /dev/loop4p3, 10) failed: No such file or directory [ 972.150387][ T5896] loop3: p1 size 11290111 extends beyond EOD, truncated [ 972.170234][ T1966] udevd[1966]: inotify_add_watch(7, /dev/loop1p1, 10) failed: No such file or directory 22:52:47 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 972.171197][ T5947] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 972.182664][ T2835] udevd[2835]: inotify_add_watch(7, /dev/loop1p3, 10) failed: No such file or directory [ 972.203156][ T5954] loop1: detected capacity change from 0 to 90881 [ 972.209784][ T5896] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 972.220110][ T2931] udevd[2931]: inotify_add_watch(7, /dev/loop4p4, 10) failed: No such file or directory 22:52:47 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 972.230800][ T5977] loop5: detected capacity change from 0 to 36609 [ 972.234179][ T5899] loop4: p1 p3 p4 [ 972.242092][ T5899] loop4: p1 size 11290111 extends beyond EOD, truncated [ 972.256085][ T1439] loop1: p1 p3 p4 [ 972.258732][ T5899] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 972.265790][ T5896] loop3: detected capacity change from 0 to 264192 [ 972.270874][ T1439] loop1: p1 size 11290111 extends beyond EOD, truncated 22:52:47 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 972.282205][ T1439] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 972.288059][ T5977] loop5: p1 p3 p4 [ 972.293218][ T5977] loop5: p1 start 131072 is beyond EOD, truncated [ 972.296955][ T5954] loop1: p1 p3 p4 [ 972.304073][ T5977] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 972.304317][ T5954] loop1: p1 size 11290111 extends beyond EOD, truncated [ 972.322717][ T5896] loop3: p1 p3 p4 [ 972.327010][ T5896] loop3: p1 size 11290111 extends beyond EOD, truncated 22:52:47 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x4c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 972.327283][ T5954] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 972.339846][ T5899] loop4: detected capacity change from 0 to 90881 [ 972.355394][ T5896] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 972.368353][ T5977] loop5: detected capacity change from 0 to 36609 22:52:47 executing program 3: syz_read_part_table(0xfdffffff00000000, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f00180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:47 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 972.375292][ T6061] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 972.393735][ T1439] loop4: p1 p3 p4 [ 972.399398][ T5954] loop1: detected capacity change from 0 to 90881 [ 972.399906][ T1439] loop4: p1 size 11290111 extends beyond EOD, truncated [ 972.415386][ T1439] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 972.423818][ T5977] loop5: p1 p3 p4 [ 972.427668][ T5977] loop5: p1 start 131072 is beyond EOD, truncated 22:52:47 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x52000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 972.436298][ T5954] loop1: p1 p3 p4 [ 972.442205][ T5954] loop1: p1 size 11290111 extends beyond EOD, truncated [ 972.446800][ T5977] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 972.449479][ T5899] loop4: p1 p3 p4 [ 972.460665][ T6159] loop3: detected capacity change from 0 to 264192 [ 972.462138][ T5899] loop4: p1 size 11290111 extends beyond EOD, truncated [ 972.475369][ T5954] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 972.484216][ T5899] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 972.501092][ T6169] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 972.501752][ T6159] loop3: p1 p3 p4 [ 972.521847][ T6159] loop3: p1 size 11290111 extends beyond EOD, truncated [ 972.529759][ T6159] loop3: p4 size 3674243072 extends beyond EOD, truncated 22:52:47 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000250000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:47 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000300ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:47 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:47 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000063000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:47 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x66030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 972.552529][ T1439] loop1: p1 p3 p4 [ 972.556470][ T1439] loop1: p1 size 11290111 extends beyond EOD, truncated [ 972.570232][ T1439] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 972.571781][ T6273] loop5: detected capacity change from 0 to 69377 22:52:47 executing program 3: syz_read_part_table(0xfeffffff00000000, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f00180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 972.594714][ T6277] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 972.604253][ T6273] loop5: p1 < > p3 p4 [ 972.610402][ T6273] loop5: partition table partially beyond EOD, truncated [ 972.621015][ T6275] loop1: detected capacity change from 0 to 90881 [ 972.638809][ T6357] loop4: detected capacity change from 0 to 90881 [ 972.641164][ T6273] loop5: p1 start 196608 is beyond EOD, truncated 22:52:47 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:47 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x68000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 972.647260][ T6365] loop3: detected capacity change from 0 to 264192 [ 972.652808][ T6273] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 972.669665][ T6275] loop1: p1 p3 p4 [ 972.673951][ T6275] loop1: p1 size 11290111 extends beyond EOD, truncated [ 972.677457][ T6384] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 972.684479][ T6275] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 972.699798][ T1439] loop5: p1 < > p3 p4 [ 972.702154][ T6357] loop4: p1 p3 p4 [ 972.703913][ T1439] loop5: partition table partially beyond EOD, truncated [ 972.707825][ T6365] loop3: p1 p3 p4 [ 972.716310][ T1439] loop5: p1 start 196608 is beyond EOD, truncated [ 972.719619][ T6357] loop4: p1 size 11290111 extends beyond EOD, truncated [ 972.725364][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 972.738046][ T6365] loop3: p1 size 11290111 extends beyond EOD, truncated [ 972.746314][ T6357] loop4: p4 size 3674243072 extends beyond EOD, truncated 22:52:47 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:47 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x6c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 972.757442][ T6365] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 972.768268][ T1439] loop4: p1 p3 p4 [ 972.768266][ T6275] loop1: detected capacity change from 0 to 90881 [ 972.778734][ T1439] loop4: p1 size 11290111 extends beyond EOD, truncated [ 972.787577][ T1439] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 972.799137][ T6275] loop1: p1 p3 p4 22:52:47 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 972.803743][ T6273] loop5: detected capacity change from 0 to 69377 [ 972.807749][ T6490] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 972.816574][ T6365] loop3: detected capacity change from 0 to 264192 [ 972.824296][ T6275] loop1: p1 size 11290111 extends beyond EOD, truncated [ 972.840831][ T6275] loop1: p4 size 3674243072 extends beyond EOD, truncated 22:52:47 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x74000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 972.868817][ T6357] loop4: detected capacity change from 0 to 90881 [ 972.883231][ T6365] loop3: p1 p3 p4 [ 972.887101][ T6365] loop3: p1 size 11290111 extends beyond EOD, truncated [ 972.891271][ T1439] loop5: p1 < > p3 p4 [ 972.898290][ T1439] loop5: partition table partially beyond EOD, truncated [ 972.899235][ T6365] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 972.913506][ T1439] loop5: p1 start 196608 is beyond EOD, truncated [ 972.915409][ T6596] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 972.920545][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 972.940496][ T6357] loop4: p1 p3 p4 [ 972.944641][ T6357] loop4: p1 size 11290111 extends beyond EOD, truncated [ 972.952762][ T6357] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 972.954315][ T1439] loop5: p1 < > p3 p4 22:52:47 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000260000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 972.964138][ T1439] loop5: partition table partially beyond EOD, truncated [ 972.971301][ T1439] loop5: p1 start 196608 is beyond EOD, truncated [ 972.979199][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 972.987988][ T6273] loop5: p1 < > p3 p4 [ 972.992090][ T6273] loop5: partition table partially beyond EOD, truncated [ 973.000527][ T6273] loop5: p1 start 196608 is beyond EOD, truncated [ 973.008527][ T6273] loop5: p4 size 3674243072 extends beyond EOD, truncated 22:52:47 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a020400ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:47 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000068000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:47 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:47 executing program 3: syz_read_part_table(0xfeffffffffffffff, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f00180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:47 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x7a000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 973.036166][ T6699] loop4: detected capacity change from 0 to 90881 [ 973.053800][ T1439] loop5: p1 < > p3 p4 [ 973.057892][ T1439] loop5: partition table partially beyond EOD, truncated [ 973.063295][ T6703] loop3: detected capacity change from 0 to 264192 [ 973.069889][ T6706] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 973.072609][ T6707] loop1: detected capacity change from 0 to 90881 [ 973.083577][ T1439] loop5: p1 start 196608 is beyond EOD, truncated [ 973.096668][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 973.098518][ T6699] loop4: p1 p3 p4 [ 973.109069][ T6699] loop4: p1 size 11290111 extends beyond EOD, truncated [ 973.118733][ T6699] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 973.126126][ T6707] loop1: p1 p3 p4 22:52:47 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:47 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x8cffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 973.130065][ T6707] loop1: p1 size 11290111 extends beyond EOD, truncated [ 973.138556][ T6703] loop3: p1 p3 p4 [ 973.140362][ T6707] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 973.142579][ T6703] loop3: p1 size 11290111 extends beyond EOD, truncated [ 973.158048][ T1439] loop1: p1 p3 p4 [ 973.162402][ T1439] loop1: p1 size 11290111 extends beyond EOD, truncated [ 973.172254][ T1439] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 973.173519][ T6703] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 973.184568][ T6699] loop4: detected capacity change from 0 to 90881 [ 973.192047][ T6812] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 973.210560][ T6815] loop5: detected capacity change from 0 to 52993 [ 973.232943][ T6815] loop5: p1 p3 p4 22:52:48 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0xab000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:48 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 973.236756][ T6815] loop5: p1 start 262144 is beyond EOD, truncated [ 973.237650][ T6703] loop3: detected capacity change from 0 to 264192 [ 973.244711][ T6699] loop4: p1 p3 p4 [ 973.254087][ T6707] loop1: detected capacity change from 0 to 90881 [ 973.265780][ T6699] loop4: p1 size 11290111 extends beyond EOD, truncated [ 973.273003][ T6815] loop5: p4 size 3674243072 extends beyond EOD, truncated 22:52:48 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa900080000036a000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 973.274131][ T6918] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 973.284827][ T6699] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 973.302626][ T6703] loop3: p1 p3 p4 [ 973.306569][ T6703] loop3: p1 size 11290111 extends beyond EOD, truncated [ 973.315773][ T6703] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 973.326752][ T6815] loop5: detected capacity change from 0 to 52993 22:52:48 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa90008000000002e0000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:48 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 973.336984][ T1439] loop4: p1 p3 p4 [ 973.343652][ T1439] loop4: p1 size 11290111 extends beyond EOD, truncated [ 973.346128][ T7008] loop1: detected capacity change from 0 to 90881 [ 973.364346][ T6815] loop5: p1 p3 p4 [ 973.366981][ T1439] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 973.368194][ T6815] loop5: p1 start 262144 is beyond EOD, truncated [ 973.383944][ T6815] loop5: p4 size 3674243072 extends beyond EOD, truncated 22:52:48 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a060400ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:48 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0xb6010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:48 executing program 3: syz_read_part_table(0xff0f000000000000, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f00180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:48 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x16f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:48 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa900080000006c000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 973.411882][ T7008] loop1: p1 p3 p4 [ 973.415818][ T7008] loop1: p1 size 11290111 extends beyond EOD, truncated [ 973.425755][ T7008] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 973.444864][ T7030] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 973.448135][ T1439] loop5: p1 p3 p4 22:52:48 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19e}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:48 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 973.459176][ T7029] loop3: detected capacity change from 0 to 264192 [ 973.469360][ T7033] loop4: detected capacity change from 0 to 90881 [ 973.472944][ T1439] loop5: p1 start 262144 is beyond EOD, truncated [ 973.484077][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 973.522025][ T7033] loop4: p1 p3 p4 [ 973.525330][ T7029] loop3: p1 p3 p4 [ 973.526924][ T7042] loop1: detected capacity change from 0 to 90881 [ 973.529589][ T7029] loop3: p1 size 11290111 extends beyond EOD, truncated [ 973.537849][ T7033] loop4: p1 size 11290111 extends beyond EOD, truncated [ 973.543653][ T7142] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 973.555334][ T7033] loop4: p4 size 3674243072 extends beyond EOD, truncated 22:52:48 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:48 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0xfeffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 973.569321][ T7070] loop5: detected capacity change from 0 to 20225 [ 973.578094][ T7029] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 973.615387][ T7247] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 973.627448][ T1439] loop1: p1 p3 p4 [ 973.627833][ T7070] loop5: p1 p3 p4 [ 973.632689][ T1439] loop1: p1 size 11290111 extends beyond EOD, truncated [ 973.636137][ T7070] loop5: p1 start 262144 is beyond EOD, truncated [ 973.649414][ T7070] loop5: p4 size 3674243072 extends beyond EOD, truncated 22:52:48 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 973.660030][ T1439] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 973.667711][ T7029] loop3: detected capacity change from 0 to 264192 [ 973.674790][ T7033] loop4: detected capacity change from 0 to 90881 [ 973.680524][ T1439] loop1: p1 p3 p4 [ 973.686582][ T1439] loop1: p1 size 11290111 extends beyond EOD, truncated [ 973.697837][ T1439] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 973.701894][ T7029] loop3: p1 p3 p4 [ 973.708213][ T7070] loop5: detected capacity change from 0 to 20225 [ 973.708975][ T7033] loop4: p1 p3 p4 [ 973.722318][ T7029] loop3: p1 size 11290111 extends beyond EOD, truncated [ 973.726798][ T7033] loop4: p1 size 11290111 extends beyond EOD, truncated [ 973.729516][ T7042] loop1: p1 p3 p4 [ 973.741953][ T7042] loop1: p1 size 11290111 extends beyond EOD, truncated [ 973.743887][ T7033] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 973.756663][ T7042] loop1: p4 size 3674243072 extends beyond EOD, truncated 22:52:48 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000480000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:48 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x248}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 973.765672][ T7029] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 973.773098][ T7070] loop5: p1 p3 p4 [ 973.776983][ T7070] loop5: p1 start 262144 is beyond EOD, truncated [ 973.784124][ T7070] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 973.805229][ T7042] loop1: detected capacity change from 0 to 90881 22:52:48 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000500ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:48 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0xffff8000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:48 executing program 3: syz_read_part_table(0xffefffff00000000, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f00180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:48 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 973.828993][ T1439] loop3: p1 p3 p4 [ 973.832998][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 973.840894][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 973.846914][ T7356] loop4: detected capacity change from 0 to 90881 [ 973.856248][ T7042] loop1: p1 p3 p4 [ 973.860129][ T7042] loop1: p1 size 11290111 extends beyond EOD, truncated [ 973.860321][ T7358] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 973.868325][ T7042] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 973.891776][ T7356] loop4: p1 p3 p4 [ 973.895839][ T7356] loop4: p1 size 11290111 extends beyond EOD, truncated [ 973.902972][ T7369] loop5: detected capacity change from 0 to 69377 [ 973.906020][ T7356] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 973.918385][ T7402] loop3: detected capacity change from 0 to 264192 22:52:48 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000074000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:48 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0xffffff7f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:48 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x302}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 973.935773][ T1439] loop1: p1 p3 p4 [ 973.940662][ T1439] loop1: p1 size 11290111 extends beyond EOD, truncated [ 973.948653][ T1439] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 973.957171][ T7369] loop5: p1 < > p3 p4 [ 973.961251][ T7369] loop5: partition table partially beyond EOD, truncated [ 973.968858][ T7402] loop3: p1 p3 p4 [ 973.971957][ T7469] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 22:52:48 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 973.977379][ T7402] loop3: p1 size 11290111 extends beyond EOD, truncated [ 973.987222][ T7369] loop5: p1 start 327680 is beyond EOD, truncated [ 973.992482][ T7356] loop4: detected capacity change from 0 to 90881 [ 974.005408][ T7369] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 974.014874][ T7472] loop1: detected capacity change from 0 to 90881 [ 974.021534][ T7402] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 974.031019][ T1439] loop3: p1 p3 p4 22:52:48 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0xffffff8c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 974.035928][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 974.045731][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 974.054414][ T7472] loop1: p1 p3 p4 [ 974.058301][ T7472] loop1: p1 size 11290111 extends beyond EOD, truncated [ 974.065639][ T7356] loop4: p1 p3 p4 [ 974.069554][ T7369] loop5: detected capacity change from 0 to 69377 [ 974.069592][ T7356] loop4: p1 size 11290111 extends beyond EOD, truncated 22:52:48 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 974.087790][ T7472] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 974.095555][ T7356] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 974.104372][ T7577] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 974.109795][ T7402] loop3: detected capacity change from 0 to 264192 [ 974.131863][ T7369] loop5: p1 < > p3 p4 22:52:48 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa90008000000004c0000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:48 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 974.135942][ T7369] loop5: partition table partially beyond EOD, truncated [ 974.144682][ T7369] loop5: p1 start 327680 is beyond EOD, truncated [ 974.159617][ T7369] loop5: p3 could not be added: 12 [ 974.164976][ T7369] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 974.174118][ T7472] loop1: detected capacity change from 0 to 90881 [ 974.181040][ T1439] loop3: p1 p3 p4 [ 974.185288][ T7682] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 974.185415][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 974.208744][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 974.210720][ T7703] loop4: detected capacity change from 0 to 90881 [ 974.222653][ T7472] loop1: p1 p3 p4 [ 974.225419][ T1439] loop3: p1 p3 p4 [ 974.226622][ T7472] loop1: p1 size 11290111 extends beyond EOD, truncated 22:52:49 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000600ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:49 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 974.230263][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 974.241771][ T7472] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 974.250853][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 974.262340][ T7703] loop4: p1 p3 p4 [ 974.266357][ T7703] loop4: p1 size 11290111 extends beyond EOD, truncated [ 974.271185][ T7735] loop5: detected capacity change from 0 to 69377 [ 974.274556][ T7703] loop4: p4 size 3674243072 extends beyond EOD, truncated 22:52:49 executing program 3: syz_read_part_table(0xffffff7f00000000, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f00180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:49 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa900080000007a000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:49 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 974.284753][ T7402] loop3: p1 p3 p4 [ 974.291066][ T7402] loop3: p1 size 11290111 extends beyond EOD, truncated [ 974.300224][ T7402] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 974.312921][ T7735] loop5: p1 < > p3 p4 [ 974.317030][ T7735] loop5: partition table partially beyond EOD, truncated [ 974.324383][ T7735] loop5: p1 start 393216 is beyond EOD, truncated [ 974.331396][ T7735] loop5: p4 size 3674243072 extends beyond EOD, truncated 22:52:49 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 974.334619][ T7793] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 974.360288][ T7703] loop4: detected capacity change from 0 to 90881 [ 974.364904][ T7822] loop1: detected capacity change from 0 to 90881 [ 974.377126][ T7792] loop3: detected capacity change from 0 to 264192 22:52:49 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:49 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x200000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 974.391833][ T7735] loop5: detected capacity change from 0 to 69377 [ 974.412080][ T1439] loop1: p1 p3 p4 [ 974.415960][ T7902] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 974.415975][ T7703] loop4: p1 p3 p4 [ 974.416143][ T7703] loop4: p1 size 11290111 extends beyond EOD, truncated 22:52:49 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 974.440059][ T1439] loop1: p1 size 11290111 extends beyond EOD, truncated [ 974.441840][ T7735] loop5: p1 < > p3 p4 [ 974.451380][ T7735] loop5: partition table partially beyond EOD, truncated [ 974.453436][ T7792] loop3: p1 p3 p4 [ 974.458881][ T7735] loop5: p1 start 393216 is beyond EOD, truncated [ 974.463842][ T7792] loop3: p1 size 11290111 extends beyond EOD, truncated [ 974.472987][ T7735] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 974.475965][ T1439] loop1: p4 size 3674243072 extends beyond EOD, truncated 22:52:49 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x800000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 974.490910][ T7792] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 974.493895][ T7703] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 974.507935][ T1439] loop1: p1 p3 p4 [ 974.512599][ T1439] loop1: p1 size 11290111 extends beyond EOD, truncated [ 974.520540][ T1439] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 974.534906][ T7822] loop1: p1 p3 p4 22:52:49 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000540000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:49 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a040600ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:49 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 974.539014][ T7822] loop1: p1 size 11290111 extends beyond EOD, truncated [ 974.546705][ T8008] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 974.567458][ T8011] loop5: detected capacity change from 0 to 36609 [ 974.569143][ T7822] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 974.584603][ T7792] loop3: detected capacity change from 0 to 264192 22:52:49 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x1000001000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 974.605084][ T1906] udevd[1906]: inotify_add_watch(7, /dev/loop4p3, 10) failed: No such file or directory [ 974.616047][ T2932] udevd[2932]: inotify_add_watch(7, /dev/loop4p1, 10) failed: No such file or directory [ 974.628002][ T8117] loop4: detected capacity change from 0 to 90881 [ 974.634914][ T8116] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 974.636509][ T1439] loop3: p1 p3 p4 [ 974.646659][ T2835] loop5: p1 p3 p4 [ 974.650670][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 974.655898][ T2835] loop5: p1 start 393216 is beyond EOD, truncated [ 974.662957][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 974.673481][ T2835] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 974.679380][ T7822] loop1: detected capacity change from 0 to 90881 [ 974.689859][ T8011] loop5: p1 p3 p4 [ 974.694131][ T8011] loop5: p1 start 393216 is beyond EOD, truncated [ 974.694949][ T7792] loop3: p1 p3 p4 [ 974.702150][ T8011] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 974.704361][ T7792] loop3: p1 size 11290111 extends beyond EOD, truncated [ 974.719575][ T7792] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 974.727620][ T7822] loop1: p1 p3 p4 [ 974.731461][ T8117] loop4: p1 p3 p4 [ 974.736491][ T8117] loop4: p1 size 11290111 extends beyond EOD, truncated [ 974.744635][ T7822] loop1: p1 size 11290111 extends beyond EOD, truncated 22:52:49 executing program 3: syz_read_part_table(0xffffffff00000000, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f00180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 974.748400][ T8117] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 974.754357][ T7822] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 974.762897][ T8011] loop5: detected capacity change from 0 to 36609 22:52:49 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa900080000387f000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:49 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:49 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x2000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 974.799410][ T8117] loop4: detected capacity change from 0 to 90881 [ 974.803535][ T1439] loop3: p1 p3 p4 [ 974.810541][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 974.818137][ T8011] loop5: p1 p3 p4 [ 974.823325][ T8221] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 974.823360][ T8011] loop5: p1 start 393216 is beyond EOD, truncated [ 974.843093][ T8117] loop4: p1 p3 p4 [ 974.846818][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 974.846957][ T8117] loop4: p1 size 11290111 extends beyond EOD, truncated [ 974.863302][ T8252] loop1: detected capacity change from 0 to 90881 [ 974.863826][ T8117] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 974.877412][ T8011] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 974.892599][ T8252] loop1: p1 p3 p4 22:52:49 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:49 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000550000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:49 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000700ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:49 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 974.896831][ T8252] loop1: p1 size 11290111 extends beyond EOD, truncated [ 974.915645][ T8252] loop1: p4 size 3674243072 extends beyond EOD, truncated 22:52:49 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:49 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 974.938906][ T8329] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 974.954183][ T8331] loop3: detected capacity change from 0 to 264192 [ 974.973506][ T8362] loop4: detected capacity change from 0 to 90881 [ 974.980232][ T8252] loop1: detected capacity change from 0 to 90881 [ 974.987398][ T8358] loop5: detected capacity change from 0 to 69377 22:52:49 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 975.008452][ T8440] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 975.021247][ T2931] loop3: p1 p3 p4 [ 975.026504][ T8362] loop4: p1 p3 p4 [ 975.026499][ T8358] loop5: p1 < > p3 p4 [ 975.030294][ T8252] loop1: p1 p3 p4 [ 975.034340][ T8358] loop5: partition table partially beyond EOD, truncated [ 975.035541][ T2931] loop3: p1 size 11290111 extends beyond EOD, [ 975.038369][ T8252] loop1: p1 size 11290111 extends beyond EOD, [ 975.045151][ T2931] truncated [ 975.051263][ T8252] truncated [ 975.051410][ T8362] loop4: p1 size 11290111 extends beyond EOD, [ 975.060049][ T8358] loop5: p1 start 458752 is beyond EOD, [ 975.060630][ T8362] truncated [ 975.064984][ T8252] loop1: p4 size 3674243072 extends beyond EOD, [ 975.070012][ T8358] truncated [ 975.073665][ T8362] loop4: p4 size 3674243072 extends beyond EOD, [ 975.075712][ T8252] truncated [ 975.079053][ T8358] loop5: p4 size 3674243072 extends beyond EOD, [ 975.085619][ T8362] truncated 22:52:49 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x10000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 975.091179][ T2931] loop3: p4 size 3674243072 extends beyond EOD, [ 975.095063][ T8358] truncated [ 975.117002][ T2931] truncated [ 975.131085][ T8362] loop4: detected capacity change from 0 to 90881 [ 975.140350][ T8545] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 975.160876][ T8331] loop3: p1 p3 p4 [ 975.161284][ T8358] loop5: detected capacity change from 0 to 69377 [ 975.164958][ T8331] loop3: p1 size 11290111 extends beyond EOD, truncated [ 975.185467][ T8331] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 975.201831][ T2932] loop4: p1 p3 p4 [ 975.205860][ T2932] loop4: p1 size 11290111 extends beyond EOD, truncated [ 975.218093][ T2932] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 975.225535][ T8358] loop5: p1 < > p3 p4 [ 975.229690][ T8358] loop5: partition table partially beyond EOD, truncated [ 975.238149][ T8362] loop4: p1 p3 p4 [ 975.239566][ T8358] loop5: p1 start 458752 is beyond EOD, truncated [ 975.242302][ T8362] loop4: p1 size 11290111 extends beyond EOD, truncated [ 975.249172][ T8358] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 975.257389][ T8362] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 975.269991][ T8331] loop3: detected capacity change from 0 to 264192 22:52:50 executing program 3: syz_read_part_table(0xfffffffffffffffe, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f00180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:50 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000182000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:50 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:50 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x10000010000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:50 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000900ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:50 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000600000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 975.305245][ T8331] loop3: p1 p3 p4 [ 975.307260][ T1439] loop5: p1 < > p3 p4 [ 975.311585][ T8331] loop3: p1 size 11290111 extends beyond EOD, truncated [ 975.313110][ T1439] loop5: partition table partially beyond EOD, truncated [ 975.323117][ T8331] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 975.331581][ T1439] loop5: p1 start 458752 is beyond EOD, truncated [ 975.341240][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 975.373116][ T8652] loop1: detected capacity change from 0 to 90881 [ 975.384022][ T8653] loop5: detected capacity change from 0 to 69377 [ 975.390534][ T8655] loop4: detected capacity change from 0 to 90881 [ 975.397190][ T8651] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 975.408346][ T8658] loop3: detected capacity change from 0 to 264192 [ 975.421907][ T8652] loop1: p1 p3 p4 [ 975.423103][ T1439] loop5: p1 < > p3 p4 [ 975.425798][ T8652] loop1: p1 size 11290111 extends beyond EOD, [ 975.429750][ T1439] loop5: partition table partially beyond EOD, [ 975.429750][ T8652] truncated [ 975.432712][ T8652] loop1: p4 size 3674243072 extends beyond EOD, [ 975.435928][ T1439] truncated [ 975.442161][ T8652] truncated [ 975.452251][ T8655] loop4: p1 p3 p4 [ 975.456396][ T1439] loop5: p1 start 589824 is beyond EOD, truncated 22:52:50 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:50 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 975.464234][ T8655] loop4: p1 size 11290111 extends beyond EOD, truncated [ 975.468706][ T8658] loop3: p1 p3 p4 [ 975.481374][ T8658] loop3: p1 size 11290111 extends beyond EOD, truncated [ 975.488541][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 975.491196][ T8658] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 975.502992][ T8655] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 975.511654][ T8652] loop1: detected capacity change from 0 to 90881 [ 975.521306][ T1439] loop5: p1 < > p3 p4 [ 975.525405][ T1439] loop5: partition table partially beyond EOD, truncated [ 975.532969][ T8762] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 975.533605][ T1439] loop5: p1 start 589824 is beyond EOD, truncated [ 975.551517][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 975.558292][ T8652] loop1: p1 p3 p4 [ 975.564430][ T8652] loop1: p1 size 11290111 extends beyond EOD, truncated 22:52:50 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2300}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 975.572689][ T8653] loop5: p1 < > p3 p4 [ 975.572939][ T8658] loop3: detected capacity change from 0 to 264192 [ 975.576775][ T8653] loop5: partition table partially beyond EOD, truncated [ 975.584286][ T8655] loop4: detected capacity change from 0 to 90881 [ 975.591945][ T8653] loop5: p1 start 589824 is beyond EOD, truncated [ 975.605332][ T8653] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 975.614472][ T8652] loop1: p4 size 3674243072 extends beyond EOD, truncated 22:52:50 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:50 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000089000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 975.632057][ T8655] loop4: p1 p3 p4 [ 975.635962][ T8655] loop4: p1 size 11290111 extends beyond EOD, truncated [ 975.642480][ T8658] loop3: p1 p3 p4 [ 975.646842][ T8658] loop3: p1 size 11290111 extends beyond EOD, truncated [ 975.647316][ T8868] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 975.667034][ T8655] loop4: p4 size 3674243072 extends beyond EOD, truncated 22:52:50 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:50 executing program 3: syz_read_part_table(0xffffffffffffffff, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f00180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:50 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x40000100000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 975.682797][ T8658] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 975.693500][ T8653] loop5: detected capacity change from 0 to 69377 [ 975.711907][ T8920] loop1: detected capacity change from 0 to 90881 [ 975.729104][ T1439] loop3: p1 p3 p4 22:52:50 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000630000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 975.733087][ T8653] loop5: p1 < > p3 p4 [ 975.736791][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 975.737174][ T8653] loop5: partition table partially beyond EOD, truncated [ 975.745379][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 975.760501][ T8653] loop5: p1 start 589824 is beyond EOD, truncated [ 975.760708][ T8975] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 22:52:50 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:50 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000a00ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:50 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x80ffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 975.767879][ T8653] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 975.778727][ T8920] loop1: p1 p3 p4 [ 975.791881][ T8920] loop1: p1 size 11290111 extends beyond EOD, truncated [ 975.799789][ T8920] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 975.809481][ T8980] loop4: detected capacity change from 0 to 90881 22:52:50 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 975.839764][ T8977] loop3: detected capacity change from 0 to 264192 [ 975.848251][ T9084] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 975.860277][ T8980] loop4: p1 p3 p4 [ 975.869781][ T8980] loop4: p1 size 11290111 extends beyond EOD, truncated [ 975.871775][ T8977] loop3: p1 p3 p4 [ 975.878824][ T9091] loop5: detected capacity change from 0 to 69377 [ 975.880801][ T8977] loop3: p1 size 11290111 extends beyond EOD, truncated [ 975.899537][ T8977] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 975.901764][ T8920] loop1: detected capacity change from 0 to 90881 [ 975.911117][ T8980] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 975.924357][ T1439] loop4: p1 p3 p4 [ 975.928320][ T1439] loop4: p1 size 11290111 extends beyond EOD, truncated 22:52:50 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:50 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 975.936727][ T1439] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 975.948402][ T9091] loop5: p1 < > p3 p4 [ 975.952620][ T9091] loop5: partition table partially beyond EOD, truncated [ 975.953244][ T8920] loop1: p1 p3 p4 [ 975.965210][ T8920] loop1: p1 size 11290111 extends beyond EOD, truncated [ 975.967183][ T9091] loop5: p1 start 655360 is beyond EOD, truncated [ 975.978462][ T8920] loop1: p4 size 3674243072 extends beyond EOD, truncated 22:52:50 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa900080000018c000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 975.987495][ T9091] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 975.990951][ T8980] loop4: detected capacity change from 0 to 90881 [ 976.005086][ T8977] loop3: detected capacity change from 0 to 264192 [ 976.012622][ T9191] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 976.033359][ T8980] loop4: p1 p3 p4 22:52:50 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4802}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:50 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 976.037251][ T8980] loop4: p1 size 11290111 extends beyond EOD, truncated [ 976.048148][ T9091] loop5: detected capacity change from 0 to 69377 [ 976.052156][ T8980] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 976.062350][ T8977] loop3: p1 p3 p4 [ 976.069771][ T8977] loop3: p1 size 11290111 extends beyond EOD, truncated [ 976.072893][ T1439] loop4: p1 p3 p4 [ 976.081200][ T1439] loop4: p1 size 11290111 extends beyond EOD, truncated [ 976.088897][ T8977] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 976.091227][ T9298] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 976.098426][ T9091] loop5: p1 < > p3 p4 [ 976.111748][ T9091] loop5: partition table partially beyond EOD, truncated [ 976.112916][ T9301] loop1: detected capacity change from 0 to 90881 [ 976.119201][ T1439] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 976.126324][ T9091] loop5: p1 start 655360 is beyond EOD, truncated 22:52:50 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="03010f00180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:50 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000680000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:50 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:50 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x300000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 976.140153][ T9091] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 976.172867][ T9301] loop1: p1 p3 p4 [ 976.180766][ T9301] loop1: p1 size 11290111 extends beyond EOD, truncated 22:52:51 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000b00ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:51 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:51 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 976.186910][ T9406] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 976.192788][ T9301] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 976.218069][ T9404] loop4: detected capacity change from 0 to 90881 [ 976.231029][ T9492] loop3: detected capacity change from 0 to 48897 [ 976.246901][ T2932] loop4: p1 p3 p4 [ 976.252183][ T1906] udevd[1906]: inotify_add_watch(7, /dev/loop1p1, 10) failed: No such file or directory [ 976.252292][ T2931] udevd[2931]: inotify_add_watch(7, /dev/loop1p3, 10) failed: No such file or directory [ 976.272296][ T1966] udevd[1966]: inotify_add_watch(7, /dev/loop1p4, 10) failed: No such file or directory [ 976.280193][ T9516] loop5: detected capacity change from 0 to 69377 [ 976.283605][ T9514] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 976.288953][ T9301] loop1: detected capacity change from 0 to 90881 [ 976.303924][ T2932] loop4: p1 size 11290111 extends beyond EOD, truncated [ 976.309309][ T9492] loop3: p1 p3 p4 [ 976.317546][ T9492] loop3: p1 size 11290111 extends beyond EOD, truncated [ 976.327383][ T9492] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 976.335162][ T9301] loop1: p1 p3 p4 [ 976.335347][ T2932] loop4: p4 size 3674243072 extends beyond EOD, truncated 22:52:51 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:51 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x500000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 976.338961][ T9516] loop5: p1 < > p3 p4 [ 976.349014][ T9301] loop1: p1 size 11290111 extends beyond EOD, [ 976.350154][ T9516] loop5: partition table partially beyond EOD, truncated [ 976.351814][ T9516] loop5: p1 start 720896 is beyond EOD, [ 976.356520][ T9301] truncated [ 976.363520][ T9516] truncated [ 976.378188][ T9516] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 976.380228][ T9301] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 976.393368][ T9404] loop4: p1 p3 p4 [ 976.400654][ T9404] loop4: p1 size 11290111 extends beyond EOD, truncated [ 976.409058][ T9404] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 976.426952][ T9621] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 22:52:51 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa900080000018e000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:51 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:51 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x600000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 976.447607][ T9492] loop3: detected capacity change from 0 to 48897 [ 976.454286][ T9516] loop5: detected capacity change from 0 to 69377 [ 976.465891][ T9404] loop4: detected capacity change from 0 to 90881 [ 976.491862][ T9516] loop5: p1 < > p3 p4 [ 976.495954][ T9516] loop5: partition table partially beyond EOD, truncated [ 976.496497][ T1439] loop3: p1 p3 p4 [ 976.504053][ T9516] loop5: p1 start 720896 is beyond EOD, truncated [ 976.508138][ T9726] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 976.515642][ T9516] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 976.526504][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 976.543295][ T9404] loop4: p1 p3 p4 [ 976.547139][ T9404] loop4: p1 size 11290111 extends beyond EOD, truncated [ 976.557338][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 976.560260][ T9769] loop1: detected capacity change from 0 to 90881 [ 976.573637][ T9404] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 976.582399][ T1439] loop3: p1 p3 p4 [ 976.586386][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 976.594450][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 976.603353][ T9492] loop3: p1 p3 p4 [ 976.607109][ T9492] loop3: p1 size 11290111 extends beyond EOD, truncated [ 976.614540][ T9769] loop1: p1 p3 p4 [ 976.615143][ T9492] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 976.618389][ T9769] loop1: p1 size 11290111 extends beyond EOD, truncated [ 976.637154][ T9769] loop1: p4 size 3674243072 extends beyond EOD, truncated 22:52:51 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="04010f00180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:51 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6f01}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:51 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000c00ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:51 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x700000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:51 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa90008000000006c0000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 976.646034][ T1439] loop1: p1 p3 p4 [ 976.649895][ T1439] loop1: p1 size 11290111 extends beyond EOD, truncated [ 976.657902][ T1439] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 976.683313][ T9833] loop5: detected capacity change from 0 to 69377 [ 976.683965][ T9834] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 976.694460][ T1439] loop3: p1 p3 p4 [ 976.701937][ T9837] loop4: detected capacity change from 0 to 90881 [ 976.705348][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 976.719249][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 976.731911][ T9837] loop4: p1 p3 p4 [ 976.735935][ T9769] loop1: detected capacity change from 0 to 90881 [ 976.742605][ T9833] loop5: p1 < > p3 p4 22:52:51 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:51 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 976.742958][ T9837] loop4: p1 size 11290111 extends beyond EOD, truncated [ 976.746696][ T9833] loop5: partition table partially beyond EOD, truncated [ 976.746858][ T9833] loop5: p1 start 786432 is beyond EOD, [ 976.755336][ T9837] loop4: p4 size 3674243072 extends beyond EOD, [ 976.760986][ T9833] truncated [ 976.766640][ T9837] truncated [ 976.782512][ T9833] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 976.798995][ T9940] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 976.799074][ T1439] loop5: p1 < > p3 p4 [ 976.814742][ T1439] loop5: partition table partially beyond EOD, truncated [ 976.820773][ T9769] loop1: p1 p3 p4 [ 976.822293][ T1439] loop5: p1 start 786432 is beyond EOD, truncated [ 976.832691][ T9769] loop1: p1 size 11290111 extends beyond EOD, truncated [ 976.840100][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated 22:52:51 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:51 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x900000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 976.842752][ T9949] loop3: detected capacity change from 0 to 48897 [ 976.848469][ T9769] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 976.873162][ T9837] loop4: detected capacity change from 0 to 90881 [ 976.897552][T10049] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 976.901897][ T9949] loop3: p1 p3 p4 [ 976.913680][ T9837] loop4: p1 p3 p4 [ 976.917166][ T9949] loop3: p1 size 11290111 extends beyond EOD, truncated [ 976.917871][ T9833] loop5: detected capacity change from 0 to 69377 [ 976.926323][ T9837] loop4: p1 size 11290111 extends beyond EOD, truncated [ 976.932010][ T9949] loop3: p4 size 3674243072 extends beyond EOD, truncated 22:52:51 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000090000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:51 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9e01}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:51 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 976.946505][ T1439] loop1: p1 p3 p4 [ 976.950314][ T1439] loop1: p1 size 11290111 extends beyond EOD, truncated [ 976.951101][ T9837] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 976.961905][ T1439] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 976.996713][ T9833] loop5: p1 < > p3 p4 [ 977.000807][ T9833] loop5: partition table partially beyond EOD, truncated [ 977.009317][ T9949] loop3: detected capacity change from 0 to 48897 [ 977.020629][ T9833] loop5: p1 start 786432 is beyond EOD, truncated [ 977.027941][ T9833] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 977.032345][T10061] loop1: detected capacity change from 0 to 90881 [ 977.043368][T10156] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 977.053076][ T9949] loop3: p1 p3 p4 [ 977.058824][ T9949] loop3: p1 size 11290111 extends beyond EOD, truncated [ 977.067480][ T9949] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 977.076927][ T1439] loop5: p1 < > p3 p4 [ 977.081032][ T1439] loop5: partition table partially beyond EOD, truncated [ 977.088774][ T1439] loop5: p1 start 786432 is beyond EOD, truncated 22:52:51 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="05010f00180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:51 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000720000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:51 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb601}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:51 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000d00ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:51 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 977.091866][T10061] loop1: p1 p3 p4 [ 977.096204][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 977.099062][T10061] loop1: p1 size 11290111 extends beyond EOD, truncated [ 977.114850][T10061] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 977.128403][T10263] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 977.130885][T10259] loop4: detected capacity change from 0 to 90881 22:52:51 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 977.151899][T10264] loop5: detected capacity change from 0 to 69377 [ 977.178242][T10337] loop3: detected capacity change from 0 to 48897 [ 977.194699][T10259] loop4: p1 p3 p4 22:52:52 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa900080000059e000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:52 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0xc00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 977.198841][T10259] loop4: p1 size 11290111 extends beyond EOD, truncated [ 977.199006][ T1439] loop5: p1 < > p3 p4 [ 977.207186][T10259] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 977.209861][ T1439] loop5: partition table partially beyond EOD, truncated [ 977.229899][ T1439] loop5: p1 start 851968 is beyond EOD, truncated [ 977.233181][T10337] loop3: p1 p3 p4 [ 977.237085][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated 22:52:52 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 977.241362][T10337] loop3: p1 size 11290111 extends beyond EOD, truncated [ 977.256377][T10373] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 977.265069][T10337] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 977.271231][T10264] loop5: p1 < > p3 p4 [ 977.279207][T10264] loop5: partition table partially beyond EOD, truncated [ 977.287854][T10264] loop5: p1 start 851968 is beyond EOD, truncated [ 977.294826][T10264] loop5: p4 size 3674243072 extends beyond EOD, truncated 22:52:52 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1dae50}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:52 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0xd00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 977.305213][T10259] loop4: detected capacity change from 0 to 90881 [ 977.312237][T10419] loop1: detected capacity change from 0 to 90881 [ 977.331234][T10337] loop3: detected capacity change from 0 to 48897 [ 977.345578][T10419] loop1: p1 p3 p4 [ 977.349402][T10259] loop4: p1 p3 p4 [ 977.356764][T10259] loop4: p1 size 11290111 extends beyond EOD, truncated [ 977.365279][T10264] loop5: detected capacity change from 0 to 69377 [ 977.369660][T10259] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 977.372534][T10419] loop1: p1 size 11290111 extends beyond EOD, truncated [ 977.389333][T10482] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 977.390411][T10337] loop3: p1 p3 p4 22:52:52 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0xe00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 977.405343][T10337] loop3: p1 size 11290111 extends beyond EOD, truncated [ 977.412693][T10419] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 977.414047][T10337] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 977.431451][ T1439] loop5: p1 < > p3 p4 [ 977.435657][ T1439] loop5: partition table partially beyond EOD, truncated 22:52:52 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="07010f00180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:52 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000740000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:52 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa90008000002aa000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 977.453599][ T1439] loop5: p1 start 851968 is beyond EOD, truncated [ 977.454201][T10585] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 977.472498][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 977.482897][T10264] loop5: p1 < > p3 p4 [ 977.487035][T10264] loop5: partition table partially beyond EOD, truncated [ 977.496334][T10264] loop5: p1 start 851968 is beyond EOD, truncated [ 977.506923][T10611] loop1: detected capacity change from 0 to 90881 [ 977.507371][T10264] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 977.515464][T10613] loop4: detected capacity change from 0 to 90881 [ 977.538028][T10659] loop3: detected capacity change from 0 to 48897 22:52:52 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000e00ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:52 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:52 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 977.561840][T10611] loop1: p1 p3 p4 [ 977.566039][T10611] loop1: p1 size 11290111 extends beyond EOD, truncated [ 977.572837][T10694] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 977.575197][ T1439] loop5: p1 < > p3 p4 [ 977.588474][T10611] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 977.588759][ T1439] loop5: partition table partially beyond EOD, truncated [ 977.588864][ T1439] loop5: p1 start 851968 is beyond EOD, [ 977.599444][T10659] loop3: p1 p3 p4 [ 977.602949][ T1439] truncated [ 977.610455][T10613] loop4: p1 p3 p4 [ 977.613783][T10659] loop3: p1 size 11290111 extends beyond EOD, [ 977.615546][T10613] loop4: p1 size 11290111 extends beyond EOD, [ 977.619126][T10659] truncated [ 977.620092][T10659] loop3: p4 size 3674243072 extends beyond EOD, [ 977.625450][T10613] truncated [ 977.631637][T10659] truncated [ 977.633770][ T1439] loop5: p4 size 3674243072 extends beyond EOD, [ 977.639296][T10613] loop4: p4 size 3674243072 extends beyond EOD, 22:52:52 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:52 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 977.641059][ T1439] truncated [ 977.663410][T10613] truncated [ 977.670773][T10611] loop1: detected capacity change from 0 to 90881 [ 977.685113][T10798] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 977.695153][T10659] loop3: detected capacity change from 0 to 48897 [ 977.711890][T10611] loop1: p1 p3 p4 [ 977.713736][T10613] loop4: detected capacity change from 0 to 90881 [ 977.718929][T10611] loop1: p1 size 11290111 extends beyond EOD, truncated [ 977.730874][T10611] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 977.733657][ T1439] loop3: p1 p3 p4 [ 977.738482][T10826] loop5: detected capacity change from 0 to 69377 [ 977.747120][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated 22:52:52 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:52 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa90008000003b1000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:52 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x1200000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 977.756923][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 977.761766][T10613] loop4: p1 p3 p4 [ 977.767955][T10613] loop4: p1 size 11290111 extends beyond EOD, truncated [ 977.777207][T10613] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 977.780410][ T1439] loop3: p1 p3 p4 [ 977.793849][T10826] loop5: p1 < > p3 p4 [ 977.797936][T10826] loop5: partition table partially beyond EOD, truncated [ 977.804366][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated 22:52:52 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa90008000000007a0000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 977.808514][T10906] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 977.813809][T10826] loop5: p1 start 917504 is beyond EOD, truncated [ 977.827436][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 977.831242][T10826] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 977.851945][T10659] loop3: p1 p3 p4 [ 977.856187][T10659] loop3: p1 size 11290111 extends beyond EOD, truncated 22:52:52 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="08010f00180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:52 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:52 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x2700000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 977.863742][T10959] loop1: detected capacity change from 0 to 90881 [ 977.866071][T10659] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 977.894151][T10959] loop1: p1 p3 p4 [ 977.898146][T10959] loop1: p1 size 11290111 extends beyond EOD, truncated [ 977.900723][T11012] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 977.922545][T10959] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 977.934161][T10826] loop5: detected capacity change from 0 to 69377 [ 977.936520][T11016] loop4: detected capacity change from 0 to 90881 [ 977.953774][T11084] loop3: detected capacity change from 0 to 48897 [ 977.960504][ T1439] loop5: p1 < > p3 p4 [ 977.964613][ T1439] loop5: partition table partially beyond EOD, truncated [ 977.972922][ T1439] loop5: p1 start 917504 is beyond EOD, truncated [ 977.980998][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 977.986663][T10959] loop1: detected capacity change from 0 to 90881 [ 977.997306][T10826] loop5: p1 < > p3 p4 [ 978.001372][T10826] loop5: partition table partially beyond EOD, truncated [ 978.001868][T11016] loop4: p1 p3 p4 [ 978.008901][T11084] loop3: p1 p3 p4 [ 978.012594][T11016] loop4: p1 size 11290111 extends beyond EOD, truncated [ 978.017514][T11084] loop3: p1 size 11290111 extends beyond EOD, truncated [ 978.023383][T10959] loop1: p1 p3 p4 [ 978.030184][T10826] loop5: p1 start 917504 is beyond EOD, truncated [ 978.036517][T10959] loop1: p1 size 11290111 extends beyond EOD, truncated [ 978.041104][T10826] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 978.048853][T11084] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 978.055346][T11016] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 978.063175][T10959] loop1: p4 size 3674243072 extends beyond EOD, truncated 22:52:52 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000f00ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:52 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:52 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:52 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa90008000000c0000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 978.109527][T11084] loop3: detected capacity change from 0 to 48897 [ 978.127154][ T2932] udevd[2932]: inotify_add_watch(7, /dev/loop4p1, 10) failed: No such file or directory [ 978.132750][ T1906] udevd[1906]: inotify_add_watch(7, /dev/loop4p3, 10) failed: No such file or directory [ 978.141761][ T2931] udevd[2931]: inotify_add_watch(7, /dev/loop4p4, 10) failed: No such file or directory [ 978.152696][T11016] loop4: detected capacity change from 0 to 90881 [ 978.163728][ T1439] loop3: p1 p3 p4 [ 978.167780][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 978.176851][T11124] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 978.179341][T11128] loop5: detected capacity change from 0 to 69377 [ 978.189290][T11127] loop1: detected capacity change from 0 to 90881 [ 978.195523][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated 22:52:53 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1004000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 978.210572][T11016] loop4: p1 p3 p4 [ 978.214634][T11016] loop4: p1 size 11290111 extends beyond EOD, truncated [ 978.223443][T11016] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 978.232044][T11127] loop1: p1 p3 p4 [ 978.235858][T11128] loop5: p1 < > p3 p4 [ 978.239926][T11128] loop5: partition table partially beyond EOD, truncated [ 978.245235][T11127] loop1: p1 size 11290111 extends beyond EOD, truncated [ 978.247603][T11128] loop5: p1 start 983040 is beyond EOD, truncated 22:52:53 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="09010f00180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:53 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000890000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:53 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x4800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:53 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 978.255590][T11084] loop3: p1 p3 p4 [ 978.261276][T11128] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 978.268211][T11084] loop3: p1 size 11290111 extends beyond EOD, truncated [ 978.279655][T11127] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 978.287789][T11084] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 978.320451][T11235] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 978.347043][T11127] loop1: detected capacity change from 0 to 90881 [ 978.358202][T11297] loop4: detected capacity change from 0 to 90881 22:52:53 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x4802000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:53 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 978.365139][T11128] loop5: detected capacity change from 0 to 69377 [ 978.377582][T11341] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 978.391994][T11345] loop3: detected capacity change from 0 to 48897 [ 978.393057][T11297] loop4: p1 p3 p4 [ 978.402385][T11127] loop1: p1 p3 p4 [ 978.403010][T11297] loop4: p1 size 11290111 extends beyond EOD, truncated [ 978.406245][T11127] loop1: p1 size 11290111 extends beyond EOD, truncated [ 978.414820][T11297] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 978.430126][T11127] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 978.431765][T11345] loop3: p1 p3 p4 [ 978.441645][T11345] loop3: p1 size 11290111 extends beyond EOD, truncated [ 978.445356][ T1439] loop5: p1 < > p3 p4 [ 978.452152][T11345] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 978.452685][ T1439] loop5: partition table partially beyond EOD, truncated 22:52:53 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 978.467636][ T1439] loop5: p1 start 983040 is beyond EOD, truncated [ 978.479291][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 978.485484][T11297] loop4: detected capacity change from 0 to 90881 [ 978.499776][ T1439] loop5: p1 < > p3 p4 [ 978.504026][ T1439] loop5: partition table partially beyond EOD, truncated [ 978.511391][ T1439] loop5: p1 start 983040 is beyond EOD, truncated [ 978.519044][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 978.527248][T11297] loop4: p1 p3 p4 [ 978.529823][T11345] loop3: detected capacity change from 0 to 48897 [ 978.531092][T11297] loop4: p1 size 11290111 extends beyond EOD, truncated [ 978.547380][T11128] loop5: p1 < > p3 p4 [ 978.547776][T11297] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 978.551468][T11128] loop5: partition table partially beyond EOD, truncated 22:52:53 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a001100ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:53 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa90008000001c2000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:53 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x4c00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:53 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:53 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000900000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 978.566563][T11128] loop5: p1 start 983040 is beyond EOD, truncated [ 978.574363][T11128] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 978.581955][T11345] loop3: p1 p3 p4 [ 978.585951][T11345] loop3: p1 size 11290111 extends beyond EOD, truncated [ 978.595763][T11455] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 978.597471][T11345] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 978.608002][T11454] loop1: detected capacity change from 0 to 90881 22:52:53 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0a010f00180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:53 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:53 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x5200000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 978.630177][T11481] loop4: detected capacity change from 0 to 90881 [ 978.662636][T11454] loop1: p1 p3 p4 [ 978.665752][ T1439] loop3: p1 p3 p4 [ 978.670116][T11454] loop1: p1 size 11290111 extends beyond EOD, truncated [ 978.670232][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 978.687404][T11454] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 978.688119][T11481] loop4: p1 p3 p4 [ 978.697109][T11561] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 978.698934][T11564] loop5: detected capacity change from 0 to 69377 [ 978.712949][T11481] loop4: p1 size 11290111 extends beyond EOD, truncated 22:52:53 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x6603000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 978.720341][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 978.734990][T11481] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 978.761155][T11564] loop5: p1 < > p3 p4 [ 978.765292][T11564] loop5: partition table partially beyond EOD, truncated 22:52:53 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 978.773115][T11667] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 978.776898][T11564] loop5: p1 start 1114112 is beyond EOD, truncated [ 978.791628][T11454] loop1: detected capacity change from 0 to 90881 [ 978.798714][T11481] loop4: detected capacity change from 0 to 90881 [ 978.812875][T11737] loop3: detected capacity change from 0 to 48897 [ 978.815458][T11564] loop5: p4 size 3674243072 extends beyond EOD, truncated 22:52:53 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x6800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 978.828467][ T1439] loop5: p1 < > p3 p4 [ 978.832588][ T1439] loop5: partition table partially beyond EOD, truncated [ 978.839880][ T1439] loop5: p1 start 1114112 is beyond EOD, truncated [ 978.846782][T11773] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 978.847929][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 978.866194][ T1966] loop1: p1 p3 p4 [ 978.869967][T11737] loop3: p1 p3 p4 [ 978.872039][T11481] loop4: p1 p3 p4 22:52:53 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 978.874206][ T1966] loop1: p1 size 11290111 extends beyond EOD, truncated [ 978.884838][T11481] loop4: p1 size 11290111 extends beyond EOD, truncated [ 978.885195][T11737] loop3: p1 size 11290111 extends beyond EOD, truncated [ 978.903501][T11737] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 978.912815][ T1966] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 978.920316][T11481] loop4: p4 size 3674243072 extends beyond EOD, truncated 22:52:53 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a001200ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:53 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa90008000005c4000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:53 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x6c00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:53 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000c00000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 978.933420][T11454] loop1: p1 p3 p4 [ 978.937450][T11454] loop1: p1 size 11290111 extends beyond EOD, truncated [ 978.950432][T11454] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 978.971603][T11737] loop3: detected capacity change from 0 to 48897 22:52:53 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 978.978225][T11880] loop5: detected capacity change from 0 to 69377 [ 978.980511][ T1439] loop4: p1 p3 p4 [ 978.988828][ T1439] loop4: p1 size 11290111 extends beyond EOD, truncated [ 978.989802][T11881] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 979.004513][ T1439] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 979.021839][T11880] loop5: p1 < > p3 p4 [ 979.022924][T11737] loop3: p1 p3 p4 [ 979.026045][T11880] loop5: partition table partially beyond EOD, truncated [ 979.029902][T11737] loop3: p1 size 11290111 extends beyond EOD, truncated [ 979.037336][T11880] loop5: p1 start 1179648 is beyond EOD, truncated [ 979.051005][T11880] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 979.058801][T11912] loop1: detected capacity change from 0 to 90881 [ 979.067316][T11892] loop4: detected capacity change from 0 to 90881 [ 979.075242][T11737] loop3: p4 size 3674243072 extends beyond EOD, truncated 22:52:53 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="14010f00180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:53 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:53 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x7400000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 979.091891][T11912] loop1: p1 p3 p4 [ 979.095751][T11912] loop1: p1 size 11290111 extends beyond EOD, truncated [ 979.103086][T11892] loop4: p1 p3 p4 [ 979.104919][T11912] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 979.110006][T11892] loop4: p1 size 11290111 extends beyond EOD, truncated [ 979.115081][T11880] loop5: detected capacity change from 0 to 69377 [ 979.132134][T11892] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 979.134413][T11992] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 979.142688][ T1439] loop3: p1 p3 p4 [ 979.154677][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 979.162032][T11880] loop5: p1 < > p3 p4 [ 979.166115][T11880] loop5: partition table partially beyond EOD, truncated [ 979.169262][T11912] loop1: detected capacity change from 0 to 90881 [ 979.173365][T11880] loop5: p1 start 1179648 is beyond EOD, truncated 22:52:54 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:54 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x7a00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 979.182233][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 979.189543][T11880] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 979.197632][T11892] loop4: detected capacity change from 0 to 90881 22:52:54 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a002000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 979.233561][T11912] loop1: p1 p3 p4 [ 979.237402][T11912] loop1: p1 size 11290111 extends beyond EOD, truncated [ 979.247605][T11912] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 979.255054][T12099] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 979.258321][T11892] loop4: p1 p3 p4 [ 979.276936][T12036] loop3: detected capacity change from 0 to 48897 22:52:54 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:54 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa90008000003cc000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:54 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x8cffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 979.279190][T11892] loop4: p1 size 11290111 extends beyond EOD, truncated [ 979.286815][T12132] loop5: detected capacity change from 0 to 69377 [ 979.291914][T11892] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 979.321968][T12132] loop5: p1 < > p3 p4 [ 979.326167][T12132] loop5: partition table partially beyond EOD, truncated 22:52:54 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000ec0000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 979.333278][T12036] loop3: p1 p3 p4 [ 979.333375][T12036] loop3: p1 size 11290111 extends beyond EOD, truncated [ 979.339366][T12132] loop5: p1 start 2097152 is beyond EOD, truncated [ 979.351729][T12206] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 979.354737][T12036] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 979.366516][T12132] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 979.377927][ T1439] loop4: p1 p3 p4 22:52:54 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:54 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 979.382146][ T1439] loop4: p1 size 11290111 extends beyond EOD, truncated [ 979.391251][T12219] loop1: detected capacity change from 0 to 90881 [ 979.399644][ T1439] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 979.423852][T12219] loop1: p1 p3 p4 [ 979.431665][T12219] loop1: p1 size 11290111 extends beyond EOD, truncated [ 979.435005][T12132] loop5: detected capacity change from 0 to 69377 [ 979.442288][T12036] loop3: detected capacity change from 0 to 48897 [ 979.456380][T12219] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 979.472856][T12316] loop4: detected capacity change from 0 to 90881 [ 979.481977][T12132] loop5: p1 < > p3 p4 [ 979.486175][T12132] loop5: partition table partially beyond EOD, truncated [ 979.494771][ T1439] loop3: p1 p3 p4 [ 979.494820][T12132] loop5: p1 start 2097152 is beyond EOD, truncated [ 979.499425][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 979.505379][T12316] loop4: p1 p3 p4 [ 979.514683][T12219] loop1: detected capacity change from 0 to 90881 [ 979.517369][T12316] loop4: p1 size 11290111 extends beyond EOD, truncated [ 979.529380][T12132] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 979.529659][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 979.544537][T12316] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 979.546232][T12036] loop3: p1 p3 p4 [ 979.555614][T12036] loop3: p1 size 11290111 extends beyond EOD, truncated [ 979.563786][T12036] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 979.571841][T12219] loop1: p1 p3 p4 [ 979.575627][T12219] loop1: p1 size 11290111 extends beyond EOD, truncated 22:52:54 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0xab00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:54 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:54 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="2f010f00180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:54 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000ae12100ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 979.586967][T12219] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 979.590803][T12316] loop4: detected capacity change from 0 to 90881 22:52:54 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa90008000001cf000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:54 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 979.626271][T12321] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 979.644361][T12326] loop5: detected capacity change from 0 to 264192 [ 979.654918][ T2932] loop4: p1 p3 p4 [ 979.658855][ T2932] loop4: p1 size 11290111 extends beyond EOD, truncated [ 979.664445][T12361] loop3: detected capacity change from 0 to 48897 [ 979.668073][ T2932] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 979.681139][ T1439] loop4: p1 p3 p4 22:52:54 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0xb601000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 979.686037][T12326] loop5: p1 p3 p4 [ 979.686407][ T1439] loop4: p1 size 11290111 extends beyond EOD, truncated [ 979.689881][T12326] loop5: p1 start 2162688 is beyond EOD, truncated [ 979.704563][T12326] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 979.712441][ T1439] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 979.720824][T12361] loop3: p1 p3 p4 [ 979.724686][T12361] loop3: p1 size 11290111 extends beyond EOD, truncated 22:52:54 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 979.728433][T12430] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 979.735342][T12361] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 979.755929][T12316] loop4: p1 p3 p4 [ 979.759813][T12316] loop4: p1 size 11290111 extends beyond EOD, truncated [ 979.766686][T12465] loop1: detected capacity change from 0 to 90881 [ 979.768605][T12316] loop4: p4 size 3674243072 extends beyond EOD, truncated 22:52:54 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:54 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000ee0000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 979.790867][T12326] loop5: detected capacity change from 0 to 264192 [ 979.812054][T12465] loop1: p1 p3 p4 [ 979.815954][T12465] loop1: p1 size 11290111 extends beyond EOD, truncated [ 979.816555][T12361] loop3: detected capacity change from 0 to 48897 [ 979.823694][T12326] loop5: p1 p3 p4 22:52:54 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 979.836776][T12538] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 979.836997][T12326] loop5: p1 start 2162688 is beyond EOD, truncated [ 979.850119][T12465] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 979.866300][T12326] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 979.882751][T12361] loop3: p1 p3 p4 22:52:54 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a002500ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:54 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0xfeffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 979.886628][T12361] loop3: p1 size 11290111 extends beyond EOD, truncated [ 979.895654][T12629] loop4: detected capacity change from 0 to 90881 [ 979.908724][ T1439] loop5: p1 p3 p4 [ 979.913102][T12465] loop1: detected capacity change from 0 to 90881 [ 979.920011][T12361] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 979.921121][ T1439] loop5: p1 start 2162688 is beyond EOD, truncated 22:52:54 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="31010f00180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 979.936774][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 979.939504][T12644] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 979.957918][T12629] loop4: p1 p3 p4 [ 979.963490][T12465] loop1: p1 p3 p4 [ 979.963551][T12629] loop4: p1 size 11290111 extends beyond EOD, truncated [ 979.967560][T12465] loop1: p1 size 11290111 extends beyond EOD, truncated 22:52:54 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:54 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 979.985585][T12629] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 979.993719][T12647] loop5: detected capacity change from 0 to 69377 [ 980.001441][T12465] loop1: p4 size 3674243072 extends beyond EOD, truncated 22:52:54 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa90008000003d2000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:54 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 980.032894][T12752] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 980.050605][T12757] loop3: detected capacity change from 0 to 48897 [ 980.054020][T12629] loop4: detected capacity change from 0 to 90881 [ 980.059263][T12647] loop5: p1 < > p3 p4 [ 980.067708][T12647] loop5: partition table partially beyond EOD, truncated [ 980.076067][T12647] loop5: p1 start 2424832 is beyond EOD, truncated 22:52:54 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 980.083158][T12757] loop3: p1 p3 p4 [ 980.087168][T12757] loop3: p1 size 11290111 extends beyond EOD, truncated [ 980.088849][T12629] loop4: p1 p3 p4 [ 980.094591][T12647] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 980.106781][T12629] loop4: p1 size 11290111 extends beyond EOD, truncated [ 980.123155][T12859] loop1: detected capacity change from 0 to 90881 22:52:54 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 980.130137][T12629] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 980.130183][T12757] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 980.144637][T12861] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 980.164543][T12859] loop1: p1 p3 p4 [ 980.169382][T12859] loop1: p1 size 11290111 extends beyond EOD, truncated [ 980.177031][T12647] loop5: detected capacity change from 0 to 69377 22:52:55 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 980.189945][T12757] loop3: detected capacity change from 0 to 48897 [ 980.193820][T12859] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 980.221888][T12647] loop5: p1 < > p3 p4 [ 980.223824][ T1439] loop4: p1 p3 p4 [ 980.225986][T12647] loop5: partition table partially beyond EOD, truncated 22:52:55 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000fe0000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:55 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 980.229760][ T1439] loop4: p1 size 11290111 extends beyond EOD, truncated [ 980.238190][T12647] loop5: p1 start 2424832 is beyond EOD, truncated [ 980.244608][T12966] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 980.252179][T12757] loop3: p1 p3 p4 [ 980.266999][T12647] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 980.272878][T12757] loop3: p1 size 11290111 extends beyond EOD, truncated [ 980.279087][T12859] loop1: detected capacity change from 0 to 90881 22:52:55 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:55 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a004000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 980.287698][ T1439] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 980.290240][T12757] loop3: p4 size 3674243072 extends beyond EOD, truncated 22:52:55 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="64010f00180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:55 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 980.348613][T12859] loop1: p1 p3 p4 [ 980.349503][T12984] loop4: detected capacity change from 0 to 90881 [ 980.354923][T13073] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 980.368331][T12859] loop1: p1 size 11290111 extends beyond EOD, truncated [ 980.378215][ T1439] loop5: p1 < > p3 p4 [ 980.382327][ T1439] loop5: partition table partially beyond EOD, truncated [ 980.382823][T12859] loop1: p4 size 3674243072 extends beyond EOD, truncated 22:52:55 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:55 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:55 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa90008000002dc000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 980.389524][ T1439] loop5: p1 start 2424832 is beyond EOD, truncated [ 980.404503][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 980.409326][T12984] loop4: p1 p3 p4 [ 980.417818][T12984] loop4: p1 size 11290111 extends beyond EOD, truncated [ 980.425996][T12984] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 980.426345][T13174] loop3: detected capacity change from 0 to 48897 [ 980.448900][T13180] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 980.471969][T13174] loop3: p1 p3 p4 [ 980.480649][ T2932] udevd[2932]: inotify_add_watch(7, /dev/loop4p1, 10) failed: No such file or directory [ 980.487663][T13174] loop3: p1 size 11290111 extends beyond EOD, truncated 22:52:55 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 980.492325][T13268] loop1: detected capacity change from 0 to 90881 [ 980.504856][ T1906] udevd[1906]: inotify_add_watch(7, /dev/loop4p3, 10) failed: No such file or directory [ 980.515527][ T2931] udevd[2931]: inotify_add_watch(7, /dev/loop4p4, 10) failed: No such file or directory [ 980.518526][T13288] loop5: detected capacity change from 0 to 69377 [ 980.529186][T12984] loop4: detected capacity change from 0 to 90881 22:52:55 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48020000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 980.536509][T13289] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 980.545012][T13174] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 980.561461][ T1439] loop3: p1 p3 p4 [ 980.565597][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 980.573270][T12984] loop4: p1 p3 p4 [ 980.577051][T13268] loop1: p1 p3 p4 [ 980.579631][T13288] loop5: p1 < > p3 p4 [ 980.581034][T13268] loop1: p1 size 11290111 extends beyond EOD, truncated [ 980.584928][T13288] loop5: partition table partially beyond EOD, truncated 22:52:55 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 980.594465][T12984] loop4: p1 size 11290111 extends beyond EOD, truncated [ 980.606314][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 980.607919][T13268] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 980.620928][T13288] loop5: p1 start 4194304 is beyond EOD, truncated [ 980.624714][T12984] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 980.638727][T13288] loop5: p4 size 3674243072 extends beyond EOD, truncated 22:52:55 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000600100024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:55 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:55 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50ae1d00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 980.677548][T13288] loop5: detected capacity change from 0 to 69377 [ 980.681996][T13268] loop1: detected capacity change from 0 to 90881 [ 980.696981][T13398] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 980.723297][T13268] loop1: p1 p3 p4 [ 980.727101][T13288] loop5: p1 < > p3 p4 [ 980.731289][T13288] loop5: partition table partially beyond EOD, truncated [ 980.733665][T13268] loop1: p1 size 11290111 extends beyond EOD, truncated [ 980.745146][T13502] loop4: detected capacity change from 0 to 90881 [ 980.746292][T13268] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 980.759885][T13288] loop5: p1 start 4194304 is beyond EOD, truncated [ 980.767151][T13288] loop5: p4 size 3674243072 extends beyond EOD, truncated 22:52:55 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a004800ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:55 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02020f00180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:55 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:55 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:55 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa90008000001e0000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 980.775861][ T1439] loop5: p1 < > p3 p4 [ 980.779940][ T1439] loop5: partition table partially beyond EOD, truncated [ 980.787122][ T1439] loop5: p1 start 4194304 is beyond EOD, truncated [ 980.794262][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 980.803647][T13502] loop4: p1 p3 p4 [ 980.807590][T13502] loop4: p1 size 11290111 extends beyond EOD, truncated [ 980.819689][T13506] loop3: detected capacity change from 0 to 48898 [ 980.825704][T13502] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 980.840575][T13507] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 22:52:55 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:55 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 980.869123][T13506] loop3: p1 p3 p4 [ 980.874208][T13506] loop3: p1 size 11290111 extends beyond EOD, truncated [ 980.881874][T13611] loop1: detected capacity change from 0 to 90881 [ 980.888312][T13613] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 980.908840][T13618] loop5: detected capacity change from 0 to 69377 [ 980.911424][T13506] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 980.915863][T13502] loop4: detected capacity change from 0 to 90881 [ 980.931085][ T1439] loop3: p1 p3 p4 [ 980.935111][T13611] loop1: p1 p3 p4 [ 980.939189][T13611] loop1: p1 size 11290111 extends beyond EOD, truncated [ 980.941245][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 980.947790][T13618] loop5: p1 < > p3 p4 [ 980.957334][T13618] loop5: partition table partially beyond EOD, truncated 22:52:55 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 980.967619][T13611] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 980.969623][T13618] loop5: p1 start 4718592 is beyond EOD, truncated [ 980.979287][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 980.985671][T13618] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 981.001964][T13502] loop4: p1 p3 p4 [ 981.006157][T13502] loop4: p1 size 11290111 extends beyond EOD, truncated 22:52:55 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000b60100024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:55 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 981.015225][T13502] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 981.027370][T13611] loop1: detected capacity change from 0 to 90881 [ 981.035985][ T1439] loop4: p1 p3 p4 [ 981.041915][ T1439] loop4: p1 size 11290111 extends beyond EOD, truncated [ 981.052688][T13506] loop3: detected capacity change from 0 to 48898 [ 981.056538][ T1439] loop4: p4 size 3674243072 extends beyond EOD, truncated 22:52:55 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6f010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 981.065394][T13618] loop5: detected capacity change from 0 to 69377 [ 981.067816][T13611] loop1: p1 p3 p4 [ 981.073862][T13723] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 981.076819][T13611] loop1: p1 size 11290111 extends beyond EOD, truncated [ 981.100159][T13611] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 981.111700][T13506] loop3: p1 p3 p4 22:52:55 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa90008000003e2000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 981.115566][T13506] loop3: p1 size 11290111 extends beyond EOD, truncated [ 981.123401][T13618] loop5: p1 < > p3 p4 [ 981.127064][T13506] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 981.127558][T13618] loop5: partition table partially beyond EOD, truncated [ 981.145344][T13618] loop5: p1 start 4718592 is beyond EOD, truncated [ 981.161681][ T1439] loop3: p1 p3 p4 [ 981.162372][T13828] loop4: detected capacity change from 0 to 90881 [ 981.166803][T13618] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 981.173804][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 981.187209][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated 22:52:56 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a004c00ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:56 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:56 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02030f00180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:56 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 981.225787][T13828] loop4: p1 p3 p4 [ 981.229642][T13828] loop4: p1 size 11290111 extends beyond EOD, truncated [ 981.238810][T13828] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 981.243323][T13834] loop1: detected capacity change from 0 to 90881 [ 981.253473][T13833] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 981.258968][T13836] loop5: detected capacity change from 0 to 69377 [ 981.268683][ T1439] loop4: p1 p3 p4 22:52:56 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 981.275510][ T1439] loop4: p1 size 11290111 extends beyond EOD, truncated [ 981.284611][T13856] loop3: detected capacity change from 0 to 48899 [ 981.288051][ T1439] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 981.302206][T13834] loop1: p1 p3 p4 [ 981.306078][T13834] loop1: p1 size 11290111 extends beyond EOD, truncated [ 981.315174][T13836] loop5: p1 < > p3 p4 [ 981.319245][T13836] loop5: partition table partially beyond EOD, truncated 22:52:56 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 981.326516][T13856] loop3: p1 p3 p4 [ 981.330327][T13856] loop3: p1 size 11290111 extends beyond EOD, truncated [ 981.340829][T13834] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 981.340913][T13941] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 981.360297][T13828] loop4: detected capacity change from 0 to 90881 [ 981.361911][T13836] loop5: p1 start 4980736 is beyond EOD, truncated 22:52:56 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 981.369501][T13856] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 981.373849][T13836] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 981.389290][ T1439] loop5: p1 < > p3 p4 [ 981.393409][ T1439] loop5: partition table partially beyond EOD, truncated [ 981.400937][ T1439] loop5: p1 start 4980736 is beyond EOD, truncated [ 981.410464][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 981.419125][T13834] loop1: detected capacity change from 0 to 90881 22:52:56 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 981.429326][T13828] loop4: p1 p3 p4 [ 981.436264][T13828] loop4: p1 size 11290111 extends beyond EOD, truncated [ 981.439344][T13856] loop3: detected capacity change from 0 to 48899 [ 981.443916][T14046] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 981.451097][T13828] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 981.470307][T13834] loop1: p1 p3 p4 22:52:56 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000040200024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:56 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a006800ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:56 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa90008000000ec000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 981.475620][T13836] loop5: detected capacity change from 0 to 69377 [ 981.482237][T13834] loop1: p1 size 11290111 extends beyond EOD, truncated [ 981.491310][T13834] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 981.501903][ T1439] loop3: p1 p3 p4 [ 981.505738][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated 22:52:56 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9e010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:56 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:56 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02040f00180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 981.524450][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 981.540866][T13856] loop3: p1 p3 p4 [ 981.545203][T13856] loop3: p1 size 11290111 extends beyond EOD, truncated [ 981.552322][T14153] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 981.554285][T13856] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 981.573101][T14157] loop5: detected capacity change from 0 to 69377 22:52:56 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb6010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:56 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:56 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 981.591527][T14194] loop1: detected capacity change from 0 to 90881 [ 981.591932][T14190] loop4: detected capacity change from 0 to 90881 [ 981.605975][ T1439] loop3: p1 p3 p4 [ 981.609813][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 981.617704][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 981.636275][T14265] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 981.641921][T14194] loop1: p1 p3 p4 [ 981.648454][T14157] loop5: p1 < > p3 p4 [ 981.655695][T14157] loop5: partition table partially beyond EOD, truncated [ 981.657401][T14194] loop1: p1 size 11290111 extends beyond EOD, truncated [ 981.662880][T14190] loop4: p1 p3 p4 [ 981.676756][T14190] loop4: p1 size 11290111 extends beyond EOD, truncated [ 981.684311][T14157] loop5: p1 start 6815744 is beyond EOD, truncated [ 981.691135][T14194] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 981.699398][T14190] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 981.701395][T14157] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 981.716294][ T1439] loop4: p1 p3 p4 [ 981.720206][ T1439] loop4: p1 size 11290111 extends beyond EOD, truncated [ 981.727417][T14325] loop3: detected capacity change from 0 to 48900 [ 981.728149][ T1439] loop4: p4 size 3674243072 extends beyond EOD, truncated 22:52:56 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:56 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 981.749462][T14194] loop1: detected capacity change from 0 to 90881 [ 981.756449][T14157] loop5: detected capacity change from 0 to 69377 [ 981.766237][T14372] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 981.772022][T14325] loop3: p1 p3 p4 [ 981.781811][T14190] loop4: detected capacity change from 0 to 90881 [ 981.791146][T14194] loop1: p1 p3 p4 [ 981.791792][T14325] loop3: p1 size 11290111 extends beyond EOD, truncated [ 981.795029][T14194] loop1: p1 size 11290111 extends beyond EOD, truncated [ 981.810575][ T1439] loop5: p1 < > p3 p4 [ 981.812014][T14194] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 981.814905][ T1439] loop5: partition table partially beyond EOD, truncated [ 981.836790][T14325] loop3: p4 size 3674243072 extends beyond EOD, truncated 22:52:56 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:56 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000000300024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 981.841723][ T1439] loop5: p1 start 6815744 is beyond EOD, truncated [ 981.851030][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 981.870141][T14477] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 981.884116][T14157] loop5: p1 < > p3 p4 [ 981.888193][T14157] loop5: partition table partially beyond EOD, truncated [ 981.889741][T14325] loop3: detected capacity change from 0 to 48900 [ 981.896369][T14157] loop5: p1 start 6815744 is beyond EOD, truncated [ 981.908765][T14157] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 981.916264][T14507] loop4: detected capacity change from 0 to 90881 22:52:56 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa90008000003ef000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:56 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:56 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:56 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a006c00ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 981.942758][T14325] loop3: p1 p3 p4 [ 981.946734][T14325] loop3: p1 size 11290111 extends beyond EOD, truncated [ 981.955343][ T1439] loop4: p1 p3 p4 [ 981.958081][T14325] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 981.962738][ T1439] loop4: p1 size 11290111 extends beyond EOD, truncated [ 981.974944][T14584] loop1: detected capacity change from 0 to 90881 [ 981.975472][ T1439] loop4: p4 size 3674243072 extends beyond EOD, truncated 22:52:56 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02050f00180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 981.983318][T14585] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 982.006772][ T1439] loop4: p1 p3 p4 [ 982.010631][ T1439] loop4: p1 size 11290111 extends beyond EOD, truncated [ 982.013022][T14591] loop5: detected capacity change from 0 to 69377 [ 982.021773][T14584] loop1: p1 p3 p4 [ 982.035565][T14584] loop1: p1 size 11290111 extends beyond EOD, truncated 22:52:56 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff8000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:56 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 982.036439][ T1439] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 982.045632][T14584] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 982.061183][T14507] loop4: p1 p3 p4 [ 982.066889][T14591] loop5: p1 < > p3 p4 [ 982.070967][T14591] loop5: partition table partially beyond EOD, truncated 22:52:56 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 982.082275][T14692] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 982.084259][T14507] loop4: p1 size 11290111 extends beyond EOD, truncated [ 982.101529][T14694] loop3: detected capacity change from 0 to 48901 [ 982.106724][T14591] loop5: p1 start 7077888 is beyond EOD, truncated [ 982.117140][T14507] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 982.123417][T14584] loop1: detected capacity change from 0 to 90881 [ 982.131014][T14591] loop5: p4 size 3674243072 extends beyond EOD, truncated 22:52:56 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 982.152284][T14694] loop3: p1 p3 p4 [ 982.154919][T14584] loop1: p1 p3 p4 [ 982.157334][T14694] loop3: p1 size 11290111 extends beyond EOD, truncated [ 982.159799][T14584] loop1: p1 size 11290111 extends beyond EOD, truncated [ 982.169845][T14694] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 982.183704][T14507] loop4: detected capacity change from 0 to 90881 [ 982.191371][T14584] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 982.197424][T14799] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 982.204308][T14591] loop5: detected capacity change from 0 to 69377 [ 982.219338][ T1439] loop3: p1 p3 p4 [ 982.223435][T14507] loop4: p1 p3 p4 [ 982.223453][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 982.228060][T14507] loop4: p1 size 11290111 extends beyond EOD, truncated [ 982.235528][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated 22:52:57 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa90008000000f2000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 982.244944][T14507] loop4: p4 size 3674243072 extends beyond EOD, truncated 22:52:57 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000020400024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:57 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:57 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 982.276337][T14591] loop5: p1 < > p3 p4 [ 982.279279][T14902] loop1: detected capacity change from 0 to 90881 [ 982.280575][T14591] loop5: partition table partially beyond EOD, truncated [ 982.299752][T14591] loop5: p1 start 7077888 is beyond EOD, truncated [ 982.303488][T14694] loop3: detected capacity change from 0 to 48901 [ 982.314498][T14902] loop1: p1 p3 p4 [ 982.314668][T14591] loop5: p4 size 3674243072 extends beyond EOD, truncated 22:52:57 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 982.318299][T14902] loop1: p1 size 11290111 extends beyond EOD, truncated [ 982.327540][T14904] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 982.346023][T14902] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 982.353882][T14909] loop4: detected capacity change from 0 to 90881 22:52:57 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a007400ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:57 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 982.385135][T14694] loop3: p1 p3 p4 [ 982.389281][T14694] loop3: p1 size 11290111 extends beyond EOD, truncated [ 982.398253][ T1439] loop5: p1 < > p3 p4 [ 982.402500][ T1439] loop5: partition table partially beyond EOD, [ 982.402501][T14909] loop4: p1 p3 p4 [ 982.408722][ T1439] truncated [ 982.408900][ T1439] loop5: p1 start 7077888 is beyond EOD, truncated [ 982.416773][T14694] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 982.426610][T14909] loop4: p1 size 11290111 extends beyond EOD, truncated [ 982.429860][T14902] loop1: detected capacity change from 0 to 90881 [ 982.443954][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 982.450111][T14909] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 982.458419][T15013] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 22:52:57 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02060f00180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:57 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:57 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 982.485017][T14902] loop1: p1 p3 p4 [ 982.488278][T15015] loop5: detected capacity change from 0 to 69377 [ 982.488882][T14902] loop1: p1 size 11290111 extends beyond EOD, truncated [ 982.501801][T14909] loop4: detected capacity change from 0 to 90881 [ 982.516734][T14902] loop1: p4 size 3674243072 extends beyond EOD, truncated 22:52:57 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 982.530497][T15121] loop3: detected capacity change from 0 to 48902 [ 982.542691][ T1439] loop5: p1 < > p3 p4 [ 982.546896][ T1439] loop5: partition table partially beyond EOD, truncated [ 982.554421][T15123] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 982.555406][ T1439] loop5: p1 start 7602176 is beyond EOD, truncated [ 982.574124][T14909] loop4: p1 p3 p4 [ 982.578052][T15121] loop3: p1 p3 p4 22:52:57 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa90008000003f2000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 982.582160][T14909] loop4: p1 size 11290111 extends beyond EOD, truncated [ 982.589336][T15121] loop3: p1 size 11290111 extends beyond EOD, truncated [ 982.598236][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 982.605110][T15121] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 982.606936][T14909] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 982.623380][T15015] loop5: p1 < > p3 p4 [ 982.627466][T15015] loop5: partition table partially beyond EOD, truncated 22:52:57 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:57 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000060400024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:57 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 982.634837][T15015] loop5: p1 start 7602176 is beyond EOD, truncated [ 982.643533][T15015] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 982.653595][T15228] loop1: detected capacity change from 0 to 90881 [ 982.670360][ T1439] loop5: p1 < > p3 p4 [ 982.671372][T15121] loop3: detected capacity change from 0 to 48902 [ 982.674464][ T1439] loop5: partition table partially beyond EOD, truncated [ 982.683479][T15232] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 982.689473][ T1439] loop5: p1 start 7602176 is beyond EOD, truncated [ 982.707583][T15228] loop1: p1 p3 p4 [ 982.711422][T15228] loop1: p1 size 11290111 extends beyond EOD, truncated [ 982.720431][T15236] loop4: detected capacity change from 0 to 90881 [ 982.727074][T15121] loop3: p1 p3 p4 22:52:57 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:57 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a007a00ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:57 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:57 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 982.730853][T15121] loop3: p1 size 11290111 extends beyond EOD, truncated [ 982.738879][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 982.740496][T15228] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 982.755891][T15121] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 982.771160][T15336] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 22:52:57 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02070f00180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:57 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:57 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 982.784200][T15236] loop4: p1 p3 p4 [ 982.788213][T15236] loop4: p1 size 11290111 extends beyond EOD, truncated [ 982.796311][T15236] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 982.809829][T15228] loop1: detected capacity change from 0 to 90881 [ 982.830378][ T1439] loop3: p1 p3 p4 22:52:57 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 982.834244][T15447] loop5: detected capacity change from 0 to 69377 [ 982.838297][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 982.843425][T15446] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 982.852281][T15236] loop4: detected capacity change from 0 to 90881 [ 982.868550][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 982.876010][T15447] loop5: p1 < > p3 p4 [ 982.876091][T15228] loop1: p1 p3 p4 [ 982.880208][T15447] loop5: partition table partially beyond EOD, truncated [ 982.882185][T15447] loop5: p1 start 7995392 is beyond EOD, [ 982.885753][T15228] loop1: p1 size 11290111 extends beyond EOD, [ 982.891015][T15447] truncated [ 982.891103][T15236] loop4: p1 p3 p4 [ 982.896749][T15228] truncated [ 982.898768][T15228] loop1: p4 size 3674243072 extends beyond EOD, [ 982.905387][T15447] loop5: p4 size 3674243072 extends beyond EOD, [ 982.906056][T15228] truncated [ 982.910296][T15236] loop4: p1 size 11290111 extends beyond EOD, [ 982.912926][T15447] truncated 22:52:57 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa90008000003fc000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:57 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 982.937929][T15236] truncated [ 982.942504][T15236] loop4: p4 size 3674243072 extends beyond EOD, truncated 22:52:57 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000000500024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:57 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:57 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 982.979570][T15447] loop5: detected capacity change from 0 to 69377 [ 982.996801][T15558] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 982.997471][ T1439] loop4: p1 p3 p4 [ 983.012807][ T1439] loop4: p1 size 11290111 extends beyond EOD, truncated [ 983.022491][T15447] loop5: p1 < > p3 p4 [ 983.026670][T15447] loop5: partition table partially beyond EOD, truncated [ 983.031600][T15609] loop3: detected capacity change from 0 to 48903 [ 983.035438][T15610] loop1: detected capacity change from 0 to 90881 [ 983.041090][ T1439] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 983.048030][T15447] loop5: p1 start 7995392 is beyond EOD, truncated [ 983.061118][T15447] loop5: p4 size 3674243072 extends beyond EOD, truncated 22:52:57 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a009000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:57 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:57 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 983.081807][T15610] loop1: p1 p3 p4 [ 983.085722][T15610] loop1: p1 size 11290111 extends beyond EOD, truncated [ 983.094410][T15610] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 983.102003][T15609] loop3: p1 p3 p4 [ 983.105932][T15609] loop3: p1 size 11290111 extends beyond EOD, truncated [ 983.118310][T15669] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 983.122014][T15609] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 983.139342][ T1439] loop3: p1 p3 p4 [ 983.143427][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 983.151409][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 983.161384][T15771] loop4: detected capacity change from 0 to 90881 [ 983.174329][T15610] loop1: detected capacity change from 0 to 90881 [ 983.185576][T15773] loop5: detected capacity change from 0 to 69377 [ 983.185723][T15609] loop3: detected capacity change from 0 to 48903 [ 983.201885][ T2932] loop4: p1 p3 p4 [ 983.205888][ T2932] loop4: p1 size 11290111 extends beyond EOD, truncated [ 983.213496][T15610] loop1: p1 p3 p4 [ 983.214167][T15773] loop5: p1 < > p3 p4 [ 983.217445][T15610] loop1: p1 size 11290111 extends beyond EOD, [ 983.221295][T15773] loop5: partition table partially beyond EOD, truncated [ 983.221489][T15773] loop5: p1 start 9437184 is beyond EOD, [ 983.227520][T15610] truncated [ 983.229230][T15609] loop3: p1 p3 p4 [ 983.234554][T15773] truncated [ 983.235714][T15610] loop1: p4 size 3674243072 extends beyond EOD, [ 983.240597][ T2932] loop4: p4 size 3674243072 extends beyond EOD, [ 983.243426][T15610] truncated [ 983.245139][T15773] loop5: p4 size 3674243072 extends beyond EOD, [ 983.247125][ T2932] truncated [ 983.248313][T15609] loop3: p1 size 11290111 extends beyond EOD, [ 983.250237][T15773] truncated 22:52:58 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02080f00180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:58 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:58 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xab}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:58 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa90008000003ff000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 983.285042][T15609] truncated [ 983.289274][T15609] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 983.290341][T15771] loop4: p1 p3 p4 [ 983.300522][T15771] loop4: p1 size 11290111 extends beyond EOD, truncated [ 983.308368][T15771] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 983.319934][T15773] loop5: detected capacity change from 0 to 69377 [ 983.324874][ T1439] loop3: p1 p3 p4 22:52:58 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:58 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 983.330470][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 983.342006][T15778] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 983.345487][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 983.362496][T15785] loop1: detected capacity change from 0 to 90881 [ 983.369585][T15773] loop5: p1 < > p3 p4 [ 983.373724][T15773] loop5: partition table partially beyond EOD, truncated [ 983.374861][T15771] loop4: detected capacity change from 0 to 90881 [ 983.385658][T15773] loop5: p1 start 9437184 is beyond EOD, truncated [ 983.394256][T15773] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 983.403013][T15785] loop1: p1 p3 p4 [ 983.406982][T15785] loop1: p1 size 11290111 extends beyond EOD, truncated [ 983.416353][T15785] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 983.426146][T15771] loop4: p1 p3 p4 [ 983.429999][T15771] loop4: p1 size 11290111 extends beyond EOD, truncated [ 983.438172][T15771] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 983.449614][T15785] loop1: detected capacity change from 0 to 90881 [ 983.449835][T15888] loop3: detected capacity change from 0 to 48904 [ 983.457195][ T1439] loop5: p1 < > p3 p4 [ 983.466732][ T1439] loop5: partition table partially beyond EOD, truncated [ 983.473866][ T1439] loop5: p1 start 9437184 is beyond EOD, truncated [ 983.480742][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated 22:52:58 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa90008000000009e0500024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:58 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:58 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:58 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a00e100ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 983.492548][T15888] loop3: p1 p3 p4 [ 983.496617][T15888] loop3: p1 size 11290111 extends beyond EOD, truncated [ 983.504680][T15888] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 983.512751][T15785] loop1: p1 p3 p4 [ 983.516625][T15785] loop1: p1 size 11290111 extends beyond EOD, truncated [ 983.526957][T15892] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 22:52:58 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:58 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 983.537722][T15785] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 983.573535][T15993] loop5: detected capacity change from 0 to 69377 [ 983.574445][T15888] loop3: detected capacity change from 0 to 48904 [ 983.589740][T16003] loop4: detected capacity change from 0 to 90881 [ 983.601910][ T1439] loop5: p1 < > p3 p4 [ 983.606115][ T1439] loop5: partition table partially beyond EOD, truncated [ 983.613526][T15888] loop3: p1 p3 p4 [ 983.613674][ T1439] loop5: p1 start 14745600 is beyond EOD, truncated [ 983.617623][T15888] loop3: p1 size 11290111 extends beyond EOD, truncated [ 983.624940][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 983.633543][T15888] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 983.639018][T16003] loop4: p1 p3 p4 [ 983.649255][T16003] loop4: p1 size 11290111 extends beyond EOD, truncated [ 983.651350][ T1439] loop5: p1 < > p3 p4 [ 983.658632][T16003] loop4: p4 size 3674243072 extends beyond EOD, [ 983.660437][ T1439] loop5: partition table partially beyond EOD, truncated 22:52:58 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="020a0f00180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:58 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000fff000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:58 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x248}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:58 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 983.660514][ T1439] loop5: p1 start 14745600 is beyond EOD, [ 983.666928][T16003] truncated [ 983.674016][ T1439] truncated [ 983.674438][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 983.694510][T15993] loop5: p1 < > p3 p4 [ 983.698583][T15993] loop5: partition table partially beyond EOD, truncated [ 983.707497][T15993] loop5: p1 start 14745600 is beyond EOD, truncated [ 983.707658][T16007] loop1: detected capacity change from 0 to 90881 [ 983.714721][T15993] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 983.725236][T16009] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 983.740592][ T2932] udevd[2932]: inotify_add_watch(7, /dev/loop4p1, 10) failed: No such file or directory [ 983.740650][ T1906] udevd[1906]: inotify_add_watch(7, /dev/loop4p3, 10) failed: No such file or directory [ 983.751650][ T2931] udevd[2931]: inotify_add_watch(7, /dev/loop4p4, 10) failed: No such file or directory 22:52:58 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:58 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 983.765318][T16003] loop4: detected capacity change from 0 to 90881 [ 983.782407][T16013] loop3: detected capacity change from 0 to 48906 [ 983.790994][ T1966] loop1: p1 p3 p4 [ 983.796222][ T1966] loop1: p1 size 11290111 extends beyond EOD, truncated [ 983.803922][T15993] loop5: detected capacity change from 0 to 69377 [ 983.811164][ T1966] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 983.821352][T16007] loop1: p1 p3 p4 [ 983.825777][T16003] loop4: p1 p3 p4 [ 983.829583][T16003] loop4: p1 size 11290111 extends beyond EOD, truncated [ 983.833318][T16007] loop1: p1 size 11290111 extends beyond EOD, truncated [ 983.838110][T16013] loop3: p1 p3 p4 [ 983.845194][T16003] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 983.848033][T16013] loop3: p1 size 11290111 extends beyond EOD, truncated [ 983.854870][ T1439] loop5: p1 < > p3 p4 [ 983.863178][T16013] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 983.865844][ T1439] loop5: partition table partially beyond EOD, truncated [ 983.868586][ T1439] loop5: p1 start 14745600 is beyond EOD, [ 983.873360][T16007] loop1: p4 size 3674243072 extends beyond EOD, [ 983.880091][ T1439] truncated [ 983.882606][ T1439] loop5: p4 size 3674243072 extends beyond EOD, [ 983.885945][T16007] truncated [ 983.892263][ T1439] truncated [ 983.909652][ T1439] loop5: p1 < > p3 p4 [ 983.913929][ T1439] loop5: partition table partially beyond EOD, truncated 22:52:58 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000c40500024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:58 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:58 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 983.921869][ T1439] loop5: p1 start 14745600 is beyond EOD, truncated [ 983.928993][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 983.937648][T15993] loop5: p1 < > p3 p4 [ 983.941767][T15993] loop5: partition table partially beyond EOD, truncated [ 983.949994][T15993] loop5: p1 start 14745600 is beyond EOD, truncated [ 983.956988][T16007] loop1: detected capacity change from 0 to 90881 [ 983.963047][T16013] loop3: detected capacity change from 0 to 48906 22:52:58 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a21e100ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:58 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:58 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa900080000f962010000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 983.965500][T16122] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 983.977267][T15993] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 984.000048][T16171] loop4: detected capacity change from 0 to 90881 [ 984.025950][T16013] loop3: p1 p3 p4 [ 984.027231][T16171] loop4: p1 p3 p4 [ 984.029871][T16013] loop3: p1 size 11290111 extends beyond EOD, truncated [ 984.034040][T16230] loop1: detected capacity change from 0 to 90881 [ 984.044917][T16013] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 984.048642][T16171] loop4: p1 size 11290111 extends beyond EOD, truncated [ 984.062819][ T1439] loop3: p1 p3 p4 [ 984.062962][T16171] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 984.066616][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 984.082104][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 984.089239][T16232] loop5: detected capacity change from 0 to 264192 [ 984.096334][T16230] loop1: p1 p3 p4 [ 984.100188][T16230] loop1: p1 size 11290111 extends beyond EOD, truncated [ 984.108667][T16230] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 984.118778][T16171] loop4: detected capacity change from 0 to 90881 22:52:58 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="020e0f00180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:58 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:58 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x366}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:58 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 984.131996][ T1439] loop5: p1 p3 p4 [ 984.135831][ T1439] loop5: p1 start 14745600 is beyond EOD, truncated [ 984.144250][T16235] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 984.144546][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 984.162430][T16171] loop4: p1 p3 p4 [ 984.168009][T16171] loop4: p1 size 11290111 extends beyond EOD, truncated [ 984.171296][T16230] loop1: detected capacity change from 0 to 90881 22:52:59 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:59 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000000600024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 984.177659][T16171] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 984.190256][ T1439] loop5: p1 p3 p4 [ 984.190614][T16255] loop3: detected capacity change from 0 to 48910 [ 984.194735][ T1439] loop5: p1 start 14745600 is beyond EOD, truncated [ 984.208758][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 984.220168][T16230] loop1: p1 p3 p4 [ 984.227249][T16255] loop3: p1 p3 p4 22:52:59 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:59 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 984.231120][T16255] loop3: p1 size 11290111 extends beyond EOD, truncated [ 984.235240][T16230] loop1: p1 size 11290111 extends beyond EOD, truncated [ 984.239530][T16232] loop5: p1 p3 p4 [ 984.251111][T16232] loop5: p1 start 14745600 is beyond EOD, truncated [ 984.251396][T16347] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 984.258571][T16255] loop3: p4 size 3674243072 extends beyond EOD, truncated 22:52:59 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 984.276450][T16230] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 984.285787][T16232] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 984.294794][T16386] loop4: detected capacity change from 0 to 90881 [ 984.330388][T16255] loop3: detected capacity change from 0 to 48910 [ 984.337573][T16386] loop4: p1 p3 p4 [ 984.341640][T16386] loop4: p1 size 11290111 extends beyond EOD, truncated [ 984.351464][T16232] loop5: detected capacity change from 0 to 264192 [ 984.352133][T16386] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 984.365406][ T1439] loop3: p1 p3 p4 [ 984.369345][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 984.377447][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 984.386326][T16255] loop3: p1 p3 p4 [ 984.390169][T16255] loop3: p1 size 11290111 extends beyond EOD, truncated [ 984.398581][T16255] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 984.403517][T16386] loop4: detected capacity change from 0 to 90881 [ 984.412576][T16232] loop5: p1 p3 p4 [ 984.416745][T16232] loop5: p1 start 14745600 is beyond EOD, truncated 22:52:59 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a0fff00ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:59 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:59 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:59 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000063010000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:59 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="020f0f00180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 984.424005][T16232] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 984.433485][ T2932] loop4: p1 p3 p4 [ 984.437402][ T2932] loop4: p1 size 11290111 extends beyond EOD, truncated [ 984.446135][ T2932] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 984.455872][ T1439] loop5: p1 p3 p4 [ 984.460464][ T1439] loop5: p1 start 14745600 is beyond EOD, truncated [ 984.465154][T16459] loop1: detected capacity change from 0 to 90881 22:52:59 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:59 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:59 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 984.470712][T16460] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 984.481218][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 984.495175][T16473] loop3: detected capacity change from 0 to 48911 [ 984.503454][T16386] loop4: p1 p3 p4 [ 984.507237][T16386] loop4: p1 size 11290111 extends beyond EOD, truncated [ 984.514587][T16459] loop1: p1 p3 p4 [ 984.518485][T16459] loop1: p1 size 11290111 extends beyond EOD, truncated 22:52:59 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000040600024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 984.525784][T16478] loop5: detected capacity change from 0 to 264192 [ 984.533310][T16386] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 984.535051][T16473] loop3: p1 p3 p4 [ 984.541732][T16459] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 984.551004][T16473] loop3: p1 size 11290111 extends beyond EOD, truncated [ 984.555117][T16573] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 984.571740][T16478] loop5: p1 p3 p4 22:52:59 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:59 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x16f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:59 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19e}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 984.577179][T16473] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 984.577789][T16478] loop5: p1 start 16711680 is beyond EOD, truncated [ 984.594198][T16478] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 984.617560][T16459] loop1: detected capacity change from 0 to 90881 [ 984.640953][T16473] loop3: detected capacity change from 0 to 48911 [ 984.647958][T16459] loop1: p1 p3 p4 [ 984.652653][T16459] loop1: p1 size 11290111 extends beyond EOD, truncated [ 984.657387][T16478] loop5: detected capacity change from 0 to 264192 [ 984.661633][T16685] loop4: detected capacity change from 0 to 90881 [ 984.669655][T16459] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 984.691887][ T1439] loop3: p1 p3 p4 [ 984.695697][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 984.703157][T16478] loop5: p1 p3 p4 [ 984.706775][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 984.706986][T16478] loop5: p1 start 16711680 is beyond EOD, truncated [ 984.719058][T16685] loop4: p1 p3 p4 [ 984.721146][T16478] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 984.724752][T16685] loop4: p1 size 11290111 extends beyond EOD, truncated [ 984.734691][ T1439] loop3: p1 p3 p4 22:52:59 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000200ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:59 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:59 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:59 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000163010000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 984.739563][T16685] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 984.742780][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 984.758595][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 984.767248][T16473] loop3: p1 p3 p4 [ 984.771116][T16473] loop3: p1 size 11290111 extends beyond EOD, truncated 22:52:59 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02100f00180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:59 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:59 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x248}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 984.784287][T16689] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 984.784906][T16690] loop1: detected capacity change from 0 to 90881 [ 984.801319][T16473] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 984.824647][T16744] loop5: detected capacity change from 0 to 69377 [ 984.831878][T16690] loop1: p1 p3 p4 [ 984.836061][T16690] loop1: p1 size 11290111 extends beyond EOD, truncated 22:52:59 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 984.840064][T16685] loop4: detected capacity change from 0 to 90881 [ 984.850096][T16690] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 984.859809][T16802] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 984.874420][ T1439] loop5: p1 < > p3 p4 [ 984.878515][ T1439] loop5: partition table partially beyond EOD, truncated [ 984.882410][T16804] loop3: detected capacity change from 0 to 48912 [ 984.885862][T16685] loop4: p1 p3 p4 [ 984.893027][ T1439] loop5: p1 start 131072 is beyond EOD, truncated [ 984.902668][T16685] loop4: p1 size 11290111 extends beyond EOD, truncated [ 984.903808][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 984.910530][T16685] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 984.925792][T16690] loop1: detected capacity change from 0 to 90881 [ 984.926868][ T1439] loop5: p1 < > p3 p4 [ 984.934643][T16804] loop3: p1 p3 p4 [ 984.936530][ T1439] loop5: partition table partially beyond EOD, truncated [ 984.936758][ T1439] loop5: p1 start 131072 is beyond EOD, [ 984.940675][T16804] loop3: p1 size 11290111 extends beyond EOD, [ 984.947266][ T1439] truncated [ 984.947883][ T1439] loop5: p4 size 3674243072 extends beyond EOD, [ 984.952961][T16804] truncated [ 984.955025][T16804] loop3: p4 size 3674243072 extends beyond EOD, [ 984.959093][ T1439] truncated [ 984.981081][T16804] truncated [ 984.985419][T16744] loop5: p1 < > p3 p4 [ 984.987442][T16690] loop1: p1 p3 p4 22:52:59 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000000700024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:52:59 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:52:59 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 984.989504][T16744] loop5: partition table partially beyond EOD, truncated [ 984.989687][T16744] loop5: p1 start 131072 is beyond EOD, [ 984.994833][T16690] loop1: p1 size 11290111 extends beyond EOD, [ 985.000321][T16744] truncated [ 985.006468][T16744] loop5: p4 size 3674243072 extends beyond EOD, [ 985.012156][T16690] truncated [ 985.018311][T16908] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 985.021656][T16744] truncated 22:52:59 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x302}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 985.029834][T16690] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 985.054889][T16922] loop4: detected capacity change from 0 to 90881 [ 985.072340][T16804] loop3: detected capacity change from 0 to 48912 [ 985.081879][ T2932] loop4: p1 p3 p4 [ 985.086155][T16744] loop5: detected capacity change from 0 to 69377 [ 985.099222][ T2932] loop4: p1 size 11290111 extends beyond EOD, truncated [ 985.107308][ T2932] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 985.117433][T16922] loop4: p1 p3 p4 [ 985.121616][T16922] loop4: p1 size 11290111 extends beyond EOD, truncated [ 985.130075][T16922] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 985.132120][T16804] loop3: p1 p3 p4 [ 985.141189][ T1439] loop5: p1 < > p3 p4 [ 985.142412][T16804] loop3: p1 size 11290111 extends beyond EOD, truncated [ 985.145301][ T1439] loop5: partition table partially beyond EOD, truncated [ 985.161462][ T1439] loop5: p1 start 131072 is beyond EOD, truncated [ 985.163155][T16804] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 985.168495][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 985.183775][T16744] loop5: p1 < > p3 p4 [ 985.187840][T16744] loop5: partition table partially beyond EOD, truncated 22:53:00 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000300ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:00 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:00 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000040000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:00 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:00 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="021d0f00180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:00 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000000900024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:00 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:00 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 985.195287][T16744] loop5: p1 start 131072 is beyond EOD, truncated [ 985.203384][T16744] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 985.220887][T17020] loop1: detected capacity change from 0 to 90881 [ 985.224798][T17021] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 985.243307][T17027] loop4: detected capacity change from 0 to 90881 22:53:00 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 985.250206][T17020] loop1: p1 p3 p4 [ 985.256091][T17020] loop1: p1 size 11290111 extends beyond EOD, truncated [ 985.263137][T17033] loop3: detected capacity change from 0 to 48925 [ 985.265167][T17020] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 985.282475][T17082] loop5: detected capacity change from 0 to 69377 [ 985.289793][ T1439] loop3: p1 p3 p4 22:53:00 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:00 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:00 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 985.294116][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 985.301134][T17027] loop4: p1 p3 p4 [ 985.307178][T17140] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 985.314777][T17027] loop4: p1 size 11290111 extends beyond EOD, truncated [ 985.329273][T17027] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 985.336984][T17082] loop5: p1 < > p3 p4 [ 985.337017][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 985.341082][T17082] loop5: partition table partially beyond EOD, truncated [ 985.359001][T17082] loop5: p1 start 196608 is beyond EOD, truncated [ 985.365916][T17020] loop1: detected capacity change from 0 to 90881 [ 985.367021][T17082] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 985.374527][ T1439] loop3: p1 p3 p4 [ 985.384733][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 985.392787][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 985.403341][T17027] loop4: detected capacity change from 0 to 90881 [ 985.411013][T17033] loop3: p1 p3 p4 [ 985.414854][T17033] loop3: p1 size 11290111 extends beyond EOD, truncated [ 985.423244][T17020] loop1: p1 p3 p4 [ 985.424722][T17033] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 985.427086][T17020] loop1: p1 size 11290111 extends beyond EOD, truncated [ 985.442066][T17027] loop4: p1 p3 p4 [ 985.445705][T17082] loop5: detected capacity change from 0 to 69377 [ 985.445974][T17027] loop4: p1 size 11290111 extends beyond EOD, truncated [ 985.458275][T17020] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 985.461235][T17027] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 985.511848][T17082] loop5: p1 < > p3 p4 [ 985.515956][T17082] loop5: partition table partially beyond EOD, truncated [ 985.520757][T17033] loop3: detected capacity change from 0 to 48925 [ 985.529972][T17082] loop5: p1 start 196608 is beyond EOD, truncated [ 985.536879][T17082] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 985.545605][ T1439] loop5: p1 < > p3 p4 [ 985.549667][ T1439] loop5: partition table partially beyond EOD, truncated 22:53:00 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000400ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:00 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:00 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:00 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000000a00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 985.557007][ T1439] loop5: p1 start 196608 is beyond EOD, truncated [ 985.557026][T17033] loop3: p1 p3 p4 [ 985.557224][T17033] loop3: p1 size 11290111 extends beyond EOD, [ 985.565214][ T1439] loop5: p4 size 3674243072 extends beyond EOD, [ 985.567159][T17033] truncated [ 985.568021][T17033] loop3: p4 size 3674243072 extends beyond EOD, [ 985.573402][ T1439] truncated [ 985.579727][T17033] truncated [ 985.605655][T17251] loop4: detected capacity change from 0 to 90881 22:53:00 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02250f00180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:00 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000080000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:00 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:00 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:00 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:00 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:00 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 985.609774][T17252] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 985.626073][T17255] loop1: detected capacity change from 0 to 90881 22:53:00 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 985.662806][T17251] loop4: p1 p3 p4 [ 985.666741][T17251] loop4: p1 size 11290111 extends beyond EOD, truncated [ 985.666841][T17365] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 985.679415][T17251] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 985.695660][ T1966] loop1: p1 p3 p4 [ 985.698657][T17376] loop3: detected capacity change from 0 to 48933 [ 985.702044][ T1966] loop1: p1 size 11290111 extends beyond EOD, truncated [ 985.720825][T17438] loop5: detected capacity change from 0 to 69377 [ 985.721186][ T1966] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 985.743032][T17251] loop4: detected capacity change from 0 to 90881 [ 985.752153][T17255] loop1: p1 p3 p4 [ 985.756180][T17255] loop1: p1 size 11290111 extends beyond EOD, truncated [ 985.764921][T17255] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 985.772665][ T1439] loop3: p1 p3 p4 [ 985.776595][T17251] loop4: p1 p3 p4 [ 985.780589][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 985.782040][T17251] loop4: p1 size 11290111 extends beyond EOD, truncated [ 985.787934][T17438] loop5: p1 < > p3 p4 [ 985.797207][T17251] loop4: p4 size 3674243072 extends beyond EOD, [ 985.798561][T17438] loop5: partition table partially beyond EOD, truncated [ 985.799519][T17438] loop5: p1 start 262144 is beyond EOD, [ 985.804917][T17251] truncated [ 985.806531][T17255] loop1: detected capacity change from 0 to 90881 [ 985.811954][T17438] truncated [ 985.819980][ T1439] loop3: p4 size 3674243072 extends beyond EOD, [ 985.821252][T17438] loop5: p4 size 3674243072 extends beyond EOD, [ 985.827095][ T1439] truncated [ 985.846107][T17438] truncated [ 985.850682][T17376] loop3: p1 p3 p4 [ 985.854539][T17376] loop3: p1 size 11290111 extends beyond EOD, truncated [ 985.864201][T17255] loop1: p1 p3 p4 [ 985.864843][T17376] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 985.868164][T17255] loop1: p1 size 11290111 extends beyond EOD, truncated [ 985.883449][T17255] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 985.895041][T17438] loop5: detected capacity change from 0 to 69377 [ 985.929688][T17376] loop3: detected capacity change from 0 to 48933 [ 985.941964][ T1439] loop5: p1 < > p3 p4 [ 985.946135][ T1439] loop5: partition table partially beyond EOD, truncated [ 985.953712][ T1439] loop5: p1 start 262144 is beyond EOD, truncated [ 985.960528][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 985.969419][T17438] loop5: p1 < > p3 p4 22:53:00 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000500ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:00 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:00 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:00 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000000b00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:00 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800004000080000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:00 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02270f00180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 985.973495][T17438] loop5: partition table partially beyond EOD, truncated [ 985.980552][T17438] loop5: p1 start 262144 is beyond EOD, truncated [ 985.987567][T17438] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 985.996120][ T1439] loop5: p1 < > p3 p4 [ 986.000213][ T1439] loop5: partition table partially beyond EOD, truncated [ 986.010490][T17483] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 986.011740][T17480] loop4: detected capacity change from 0 to 90881 22:53:00 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2300}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:00 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:00 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:00 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:00 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:00 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 986.024069][T17484] loop1: detected capacity change from 0 to 90881 [ 986.036456][ T1439] loop5: p1 start 262144 is beyond EOD, truncated [ 986.042618][T17486] loop3: detected capacity change from 0 to 48935 [ 986.044703][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 986.090923][T17600] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 986.095986][T17480] loop4: p1 p3 p4 [ 986.104099][T17486] loop3: p1 p3 p4 [ 986.106696][T17480] loop4: p1 size 11290111 extends beyond EOD, truncated [ 986.115003][T17486] loop3: p1 size 11290111 extends beyond EOD, truncated [ 986.117955][T17484] loop1: p1 p3 p4 [ 986.125950][T17486] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 986.128360][T17484] loop1: p1 size 11290111 extends beyond EOD, truncated [ 986.142588][T17480] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 986.147412][T17484] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 986.164178][T17666] loop5: detected capacity change from 0 to 69377 [ 986.182314][T17486] loop3: detected capacity change from 0 to 48935 [ 986.190654][T17484] loop1: detected capacity change from 0 to 90881 [ 986.197587][ T1439] loop5: p1 < > p3 p4 [ 986.201747][ T1439] loop5: partition table partially beyond EOD, truncated [ 986.205113][T17480] loop4: detected capacity change from 0 to 90881 [ 986.209191][ T1439] loop5: p1 start 327680 is beyond EOD, truncated [ 986.217035][T17486] loop3: p1 p3 p4 [ 986.222160][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 986.225523][T17486] loop3: p1 size 11290111 extends beyond EOD, truncated [ 986.235069][T17484] loop1: p1 p3 p4 [ 986.240980][T17486] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 986.243622][T17484] loop1: p1 size 11290111 extends beyond EOD, truncated [ 986.252052][ T1439] loop5: p1 < > p3 p4 [ 986.259243][T17484] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 986.261741][ T1439] loop5: partition table partially beyond EOD, truncated [ 986.262697][ T1439] loop5: p1 start 327680 is beyond EOD, truncated [ 986.277087][T17480] loop4: p1 p3 p4 [ 986.283311][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 986.286292][T17480] loop4: p1 size 11290111 extends beyond EOD, truncated [ 986.301461][T17480] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 986.302669][T17666] loop5: p1 < > p3 p4 [ 986.312809][T17666] loop5: partition table partially beyond EOD, truncated [ 986.320059][T17666] loop5: p1 start 327680 is beyond EOD, truncated [ 986.327283][T17666] loop5: p4 size 3674243072 extends beyond EOD, truncated 22:53:01 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000600ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:01 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4802}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:01 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:01 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="022c0f00180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:01 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000100000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:01 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000000c00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:01 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:01 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 986.405151][T17712] loop3: detected capacity change from 0 to 48940 [ 986.405186][T17711] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 986.409977][T17716] loop4: detected capacity change from 0 to 90881 [ 986.413704][T17717] loop1: detected capacity change from 0 to 90881 [ 986.442754][T17782] loop5: detected capacity change from 0 to 69377 22:53:01 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:01 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 986.461327][T17823] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 986.475170][T17716] loop4: p1 p3 p4 [ 986.479381][T17716] loop4: p1 size 11290111 extends beyond EOD, truncated [ 986.487013][ T1439] loop5: p1 < > p3 p4 [ 986.487110][T17712] loop3: p1 p3 p4 [ 986.491174][ T1439] loop5: partition table partially beyond EOD, truncated [ 986.496059][T17717] loop1: p1 p3 p4 22:53:01 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:01 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6f01}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 986.503356][ T1439] loop5: p1 start 393216 is beyond EOD, truncated [ 986.506322][T17717] loop1: p1 size 11290111 extends beyond EOD, truncated [ 986.519122][T17712] loop3: p1 size 11290111 extends beyond EOD, truncated [ 986.527040][T17716] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 986.531049][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 986.537362][T17717] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 986.548638][T17712] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 986.559413][ T1439] loop5: p1 < > p3 p4 [ 986.563663][ T1439] loop5: partition table partially beyond EOD, truncated [ 986.570868][ T1439] loop5: p1 start 393216 is beyond EOD, truncated [ 986.578506][T17716] loop4: detected capacity change from 0 to 90881 [ 986.583995][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 986.593734][T17782] loop5: p1 < > p3 p4 [ 986.597870][T17782] loop5: partition table partially beyond EOD, truncated [ 986.605287][T17782] loop5: p1 start 393216 is beyond EOD, truncated 22:53:01 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000700ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:01 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:01 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 986.612559][T17716] loop4: p1 p3 p4 [ 986.614774][T17782] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 986.622166][T17716] loop4: p1 size 11290111 extends beyond EOD, truncated [ 986.623963][T17712] loop3: detected capacity change from 0 to 48940 [ 986.631462][T17717] loop1: detected capacity change from 0 to 90881 [ 986.639145][T17716] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 986.681793][ T1439] loop3: p1 p3 p4 [ 986.687347][T17938] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 986.690970][T17717] loop1: p1 p3 p4 [ 986.699833][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 986.705948][T17717] loop1: p1 size 11290111 extends beyond EOD, truncated [ 986.710349][T17943] loop5: detected capacity change from 0 to 69377 [ 986.718716][T17717] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 986.725561][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 986.740940][T17712] loop3: p1 p3 p4 [ 986.743221][T17943] loop5: p1 < > p3 p4 [ 986.744830][T17712] loop3: p1 size 11290111 extends beyond EOD, [ 986.748731][T17943] loop5: partition table partially beyond EOD, truncated [ 986.749065][T17943] loop5: p1 start 458752 is beyond EOD, [ 986.754930][T17712] truncated [ 986.761976][T17943] truncated [ 986.770608][T17712] loop3: p4 size 3674243072 extends beyond EOD, 22:53:01 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02640f00180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:01 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000000d00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:01 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:01 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4802}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:01 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000200000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:01 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9e01}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:01 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb601}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 986.773624][T17943] loop5: p4 size 3674243072 extends beyond EOD, [ 986.773930][T17712] truncated [ 986.780200][T17943] truncated [ 986.809976][T18045] loop4: detected capacity change from 0 to 90881 [ 986.813784][T18048] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 22:53:01 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:01 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 986.836940][T17943] loop5: detected capacity change from 0 to 69377 [ 986.853606][T18045] loop4: p1 p3 p4 [ 986.853696][T18071] loop1: detected capacity change from 0 to 90881 [ 986.857471][T18045] loop4: p1 size 11290111 extends beyond EOD, truncated [ 986.874022][T18045] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 986.885681][T18130] loop3: detected capacity change from 0 to 48996 [ 986.901957][ T1439] loop5: p1 < > p3 p4 [ 986.906045][ T1439] loop5: partition table partially beyond EOD, truncated [ 986.913434][ T1439] loop5: p1 start 458752 is beyond EOD, truncated [ 986.920489][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 986.928288][T18071] loop1: p1 p3 p4 [ 986.932290][T18071] loop1: p1 size 11290111 extends beyond EOD, truncated [ 986.934078][T17943] loop5: p1 < > p3 p4 [ 986.940296][T18071] loop1: p4 size 3674243072 extends beyond EOD, [ 986.943520][T17943] loop5: partition table partially beyond EOD, [ 986.943525][T18071] truncated [ 986.959189][T17943] truncated [ 986.962550][T17943] loop5: p1 start 458752 is beyond EOD, truncated [ 986.969608][T18130] loop3: p1 p3 p4 [ 986.969871][T17943] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 986.973586][T18130] loop3: p1 size 11290111 extends beyond EOD, truncated 22:53:01 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000800ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:01 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:01 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1dae50}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 986.993091][T18130] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 987.003497][T18045] loop4: detected capacity change from 0 to 90881 [ 987.011702][T18071] loop1: detected capacity change from 0 to 90881 [ 987.040255][T18167] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 987.041844][T18045] loop4: p1 p3 p4 [ 987.056550][T18045] loop4: p1 size 11290111 extends beyond EOD, truncated [ 987.065223][T18045] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 987.069632][T18071] loop1: p1 p3 p4 [ 987.072898][T18130] loop3: detected capacity change from 0 to 48996 [ 987.076354][T18071] loop1: p1 size 11290111 extends beyond EOD, truncated [ 987.096313][T18071] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 987.097117][T18183] loop5: detected capacity change from 0 to 69377 [ 987.112423][ T1439] loop3: p1 p3 p4 [ 987.116421][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 987.124556][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 987.137068][T18183] loop5: p1 < > p3 p4 [ 987.138894][T18130] loop3: p1 p3 p4 [ 987.141246][T18183] loop5: partition table partially beyond EOD, truncated [ 987.141368][T18183] loop5: p1 start 524288 is beyond EOD, [ 987.148275][T18130] loop3: p1 size 11290111 extends beyond EOD, [ 987.152080][T18183] truncated [ 987.157670][T18130] truncated [ 987.158499][T18130] loop3: p4 size 3674243072 extends beyond EOD, [ 987.168849][T18183] loop5: p4 size 3674243072 extends beyond EOD, [ 987.170060][T18130] truncated [ 987.186112][T18183] truncated [ 987.190589][ T1439] loop5: p1 < > p3 p4 22:53:02 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02fe0f00180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:02 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:02 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000000e00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:02 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:02 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000001630000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 987.194730][ T1439] loop5: partition table partially beyond EOD, truncated [ 987.202283][ T1439] loop5: p1 start 524288 is beyond EOD, truncated [ 987.208993][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 987.233409][T18279] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 22:53:02 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:02 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:02 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 987.236426][T18275] loop4: detected capacity change from 0 to 90881 [ 987.250680][T18281] loop1: detected capacity change from 0 to 90881 [ 987.263142][T18183] loop5: detected capacity change from 0 to 69377 [ 987.277100][T18318] loop3: detected capacity change from 0 to 49150 22:53:02 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:02 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000900ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:02 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6603}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:02 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1004000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 987.295516][ T2932] loop4: p1 p3 p4 [ 987.300741][ T2932] loop4: p1 size 11290111 extends beyond EOD, truncated [ 987.312538][ T2932] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 987.315209][T18281] loop1: p1 p3 p4 [ 987.325930][ T1439] loop3: p1 p3 p4 [ 987.329909][T18399] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 987.331194][T18275] loop4: p1 p3 p4 [ 987.346792][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 987.350359][T18281] loop1: p1 size 11290111 extends beyond EOD, truncated [ 987.355667][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 987.362156][T18275] loop4: p1 size 11290111 extends beyond EOD, truncated [ 987.375994][T18275] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 987.377145][T18403] loop5: detected capacity change from 0 to 69377 [ 987.390795][T18281] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 987.391991][T18318] loop3: p1 p3 p4 [ 987.404662][T18318] loop3: p1 size 11290111 extends beyond EOD, truncated [ 987.412719][T18318] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 987.423006][T18403] loop5: p1 < > p3 p4 [ 987.427130][T18403] loop5: partition table partially beyond EOD, truncated [ 987.435111][T18403] loop5: p1 start 589824 is beyond EOD, truncated [ 987.436769][T18275] loop4: detected capacity change from 0 to 90881 [ 987.448957][T18403] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 987.457745][T18318] loop3: detected capacity change from 0 to 49150 [ 987.460950][T18281] loop1: detected capacity change from 0 to 90881 [ 987.468473][ T1439] loop5: p1 < > p3 p4 [ 987.472041][T18275] loop4: p1 p3 p4 [ 987.474914][ T1439] loop5: partition table partially beyond EOD, truncated [ 987.478883][T18275] loop4: p1 size 11290111 extends beyond EOD, truncated [ 987.486244][ T1439] loop5: p1 start 589824 is beyond EOD, truncated [ 987.494937][T18275] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 987.499645][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 987.521857][T18281] loop1: p1 p3 p4 [ 987.521889][T18318] loop3: p1 p3 p4 [ 987.525824][T18281] loop1: p1 size 11290111 extends beyond EOD, truncated [ 987.529562][T18318] loop3: p1 size 11290111 extends beyond EOD, truncated 22:53:02 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010200180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:02 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:02 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:02 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000000f00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:02 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa900080000ffff800000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 987.537787][T18281] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 987.546672][T18318] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 987.560389][T18403] loop5: detected capacity change from 0 to 69377 22:53:02 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000a00ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:02 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 987.611839][T18507] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 987.618336][T18508] loop4: detected capacity change from 0 to 90881 [ 987.630649][ T1439] loop3: p1 p3 p4 [ 987.634727][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 987.642146][T18519] loop1: detected capacity change from 0 to 90881 [ 987.650747][T18559] loop5: detected capacity change from 0 to 69377 [ 987.653005][T18508] loop4: p1 p3 p4 22:53:02 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:02 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:02 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:02 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 987.659816][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 987.661070][T18508] loop4: p1 size 11290111 extends beyond EOD, truncated [ 987.680994][T18508] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 987.701816][T18559] loop5: p1 < > p3 p4 22:53:02 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 987.704764][T18626] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 987.705908][T18559] loop5: partition table partially beyond EOD, truncated [ 987.708238][T18559] loop5: p1 start 655360 is beyond EOD, [ 987.721266][T18519] loop1: p1 p3 p4 [ 987.724538][T18559] truncated [ 987.735726][T18559] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 987.737401][T18573] loop3: detected capacity change from 0 to 45569 [ 987.752905][T18519] loop1: p1 size 11290111 extends beyond EOD, truncated [ 987.759828][ T1439] loop5: p1 < > p3 p4 [ 987.764041][ T1439] loop5: partition table partially beyond EOD, truncated [ 987.765711][T18519] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 987.773802][ T1439] loop5: p1 start 655360 is beyond EOD, truncated [ 987.784866][T18508] loop4: detected capacity change from 0 to 90881 [ 987.786197][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 987.801907][T18573] loop3: p1 p3 p4 [ 987.805758][T18573] loop3: p1 size 11290111 extends beyond EOD, truncated [ 987.814161][T18573] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 987.822812][T18508] loop4: p1 p3 p4 [ 987.826611][T18508] loop4: p1 size 11290111 extends beyond EOD, truncated [ 987.827074][T18559] loop5: detected capacity change from 0 to 69377 [ 987.834502][T18508] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 987.844207][T18519] loop1: detected capacity change from 0 to 90881 [ 987.862595][T18559] loop5: p1 < > p3 p4 [ 987.866712][T18559] loop5: partition table partially beyond EOD, truncated [ 987.874075][T18559] loop5: p1 start 655360 is beyond EOD, truncated [ 987.880315][T18573] loop3: detected capacity change from 0 to 45569 [ 987.881521][T18559] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 987.911836][T18519] loop1: p1 p3 p4 [ 987.914653][ T1906] udevd[1906]: inotify_add_watch(7, /dev/loop4p3, 10) failed: No such file or directory [ 987.915706][T18519] loop1: p1 size 11290111 extends beyond EOD, truncated [ 987.927687][ T2932] udevd[2932]: inotify_add_watch(7, /dev/loop4p1, 10) failed: No such file or directory [ 987.933517][ T2931] udevd[2931]: inotify_add_watch(7, /dev/loop4p4, 10) failed: No such file or directory [ 987.953169][T18519] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 987.953318][ T1439] loop5: p1 < > p3 p4 [ 987.964405][ T1439] loop5: partition table partially beyond EOD, truncated [ 987.964417][T18573] loop3: p1 p3 p4 [ 987.964523][T18573] loop3: p1 size 11290111 extends beyond EOD, [ 987.973230][ T1439] loop5: p1 start 655360 is beyond EOD, [ 987.975304][T18573] truncated [ 987.976257][T18573] loop3: p4 size 3674243072 extends beyond EOD, [ 987.981476][ T1439] truncated [ 987.982312][ T1439] loop5: p4 size 3674243072 extends beyond EOD, [ 987.987152][T18573] truncated [ 987.990212][ T1439] truncated 22:53:02 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010300180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:02 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:02 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:02 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000001100024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:02 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000b00ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:02 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000900000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:02 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:02 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 988.053054][ T1439] loop3: p1 p3 p4 [ 988.059825][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 988.065525][T18737] loop4: detected capacity change from 0 to 90881 [ 988.068561][T18738] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 988.086820][T18741] loop5: detected capacity change from 0 to 69377 [ 988.091082][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated 22:53:02 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 988.103442][T18737] loop4: p1 p3 p4 [ 988.107408][T18737] loop4: p1 size 11290111 extends beyond EOD, truncated [ 988.115664][T18737] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 988.124060][T18741] loop5: p1 < > p3 p4 [ 988.124794][T18784] loop1: detected capacity change from 0 to 90881 [ 988.128254][T18741] loop5: partition table partially beyond EOD, truncated 22:53:02 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:03 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 988.147975][T18741] loop5: p1 start 720896 is beyond EOD, truncated [ 988.149521][T18813] loop3: detected capacity change from 0 to 45825 [ 988.158610][T18741] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 988.170603][ T1439] loop5: p1 < > p3 p4 [ 988.174796][ T1439] loop5: partition table partially beyond EOD, truncated [ 988.175295][T18784] loop1: p1 p3 p4 [ 988.182261][ T1439] loop5: p1 start 720896 is beyond EOD, truncated [ 988.190141][T18737] loop4: detected capacity change from 0 to 90881 22:53:03 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 988.193409][T18784] loop1: p1 size 11290111 extends beyond EOD, truncated [ 988.205019][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 988.215026][T18784] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 988.223161][T18813] loop3: p1 p3 p4 [ 988.227255][T18813] loop3: p1 size 11290111 extends beyond EOD, truncated [ 988.228594][T18862] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 988.238786][T18813] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 988.248643][T18737] loop4: p1 p3 p4 [ 988.257063][T18737] loop4: p1 size 11290111 extends beyond EOD, truncated [ 988.266426][T18737] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 988.271793][T18741] loop5: detected capacity change from 0 to 69377 [ 988.288466][T18784] loop1: detected capacity change from 0 to 90881 [ 988.288544][T18813] loop3: detected capacity change from 0 to 45825 22:53:03 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010400180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:03 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:03 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000c00ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:03 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xab00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:03 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000001200024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 988.314283][T18813] loop3: p1 p3 p4 [ 988.320094][T18813] loop3: p1 size 11290111 extends beyond EOD, truncated [ 988.321836][T18784] loop1: p1 p3 p4 [ 988.328372][T18813] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 988.332110][T18784] loop1: p1 size 11290111 extends beyond EOD, truncated [ 988.346252][T18784] loop1: p4 size 3674243072 extends beyond EOD, truncated 22:53:03 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000c00000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:03 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:03 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:03 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:03 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb601}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:03 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 988.386495][T18968] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 988.390835][T18969] loop5: detected capacity change from 0 to 69377 [ 988.399225][T18971] loop4: detected capacity change from 0 to 90881 [ 988.424625][T18974] loop3: detected capacity change from 0 to 46081 22:53:03 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 988.457472][T19084] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 988.469597][T19088] loop1: detected capacity change from 0 to 90881 [ 988.476177][ T1439] loop5: p1 < > p3 p4 [ 988.476321][T18974] loop3: p1 p3 p4 [ 988.480284][ T1439] loop5: partition table partially beyond EOD, truncated [ 988.485499][T18971] loop4: p1 p3 p4 [ 988.494451][ T1439] loop5: p1 start 786432 is beyond EOD, truncated [ 988.496338][T18974] loop3: p1 size 11290111 extends beyond EOD, truncated [ 988.504939][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 988.510170][T18971] loop4: p1 size 11290111 extends beyond EOD, truncated [ 988.523512][T18974] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 988.526935][T18969] loop5: p1 < > p3 p4 [ 988.532150][T18971] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 988.534832][T18969] loop5: partition table partially beyond EOD, truncated [ 988.549151][T18969] loop5: p1 start 786432 is beyond EOD, truncated [ 988.556188][T18969] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 988.571877][ T2931] loop1: p1 p3 p4 [ 988.575800][ T2931] loop1: p1 size 11290111 extends beyond EOD, truncated [ 988.584001][ T2931] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 988.599187][T18969] loop5: detected capacity change from 0 to 69377 [ 988.607648][T19088] loop1: p1 p3 p4 [ 988.615465][T18974] loop3: detected capacity change from 0 to 46081 [ 988.615549][T19088] loop1: p1 size 11290111 extends beyond EOD, truncated [ 988.623329][T18971] loop4: detected capacity change from 0 to 90881 [ 988.629851][T19088] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 988.642885][ T1439] loop5: p1 < > p3 p4 [ 988.646947][ T1439] loop5: partition table partially beyond EOD, truncated [ 988.653091][T18974] loop3: p1 p3 p4 [ 988.658331][T18974] loop3: p1 size 11290111 extends beyond EOD, truncated [ 988.666851][T18971] loop4: p1 p3 p4 [ 988.670877][T18971] loop4: p1 size 11290111 extends beyond EOD, truncated [ 988.679236][T18974] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 988.693146][ T1439] loop5: p1 start 786432 is beyond EOD, truncated [ 988.695346][T18971] loop4: p4 size 3674243072 extends beyond EOD, truncated 22:53:03 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010500180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:03 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:03 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000d00ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:03 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:03 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000000100024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:03 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:03 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000001c00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 988.709172][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 988.718534][T18969] loop5: p1 < > p3 p4 [ 988.722637][T18969] loop5: partition table partially beyond EOD, truncated [ 988.729749][T18969] loop5: p1 start 786432 is beyond EOD, truncated [ 988.737054][T18969] loop5: p4 size 3674243072 extends beyond EOD, truncated 22:53:03 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:03 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 988.757848][T19199] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 988.760836][T19200] loop1: detected capacity change from 0 to 90881 [ 988.777712][T19203] loop3: detected capacity change from 0 to 46337 [ 988.792158][T19200] loop1: p1 p3 p4 [ 988.796029][T19200] loop1: p1 size 11290111 extends beyond EOD, truncated 22:53:03 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:03 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48020000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:03 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 988.809782][T19271] loop4: detected capacity change from 0 to 90881 [ 988.813119][T19200] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 988.819378][ T1439] loop3: p1 p3 p4 [ 988.828346][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 988.847536][T19319] loop5: detected capacity change from 0 to 69377 [ 988.847919][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 988.854365][T19271] loop4: p1 p3 p4 [ 988.867277][T19200] loop1: detected capacity change from 0 to 90881 [ 988.868105][T19321] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 988.879921][T19271] loop4: p1 size 11290111 extends beyond EOD, truncated [ 988.894742][T19271] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 988.897670][T19203] loop3: p1 p3 p4 [ 988.905878][T19203] loop3: p1 size 11290111 extends beyond EOD, truncated [ 988.912460][T19200] loop1: p1 p3 p4 [ 988.914002][T19203] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 988.916569][T19200] loop1: p1 size 11290111 extends beyond EOD, truncated [ 988.932263][T19200] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 988.932999][T19319] loop5: p1 < > p3 p4 [ 988.943476][ T1439] loop3: p1 p3 p4 [ 988.943590][T19319] loop5: partition table partially beyond EOD, truncated [ 988.950699][T19271] loop4: detected capacity change from 0 to 90881 [ 988.955945][T19319] loop5: p1 start 851968 is beyond EOD, truncated [ 988.961173][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 988.968250][T19319] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 988.977475][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 988.997130][T19271] loop4: p1 p3 p4 [ 989.002797][T19271] loop4: p1 size 11290111 extends beyond EOD, truncated [ 989.013433][T19319] loop5: detected capacity change from 0 to 69377 [ 989.024054][T19203] loop3: detected capacity change from 0 to 46337 [ 989.024897][T19271] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 989.051800][ T1439] loop5: p1 < > p3 p4 [ 989.053011][T19203] loop3: p1 p3 p4 [ 989.055961][ T1439] loop5: partition table partially beyond EOD, truncated [ 989.056110][ T1439] loop5: p1 start 851968 is beyond EOD, [ 989.059825][T19203] loop3: p1 size 11290111 extends beyond EOD, [ 989.066800][ T1439] truncated [ 989.067814][ T1439] loop5: p4 size 3674243072 extends beyond EOD, [ 989.072477][T19203] truncated [ 989.078606][ T1439] truncated [ 989.084918][T19203] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 989.105072][T19319] loop5: p1 < > p3 p4 22:53:03 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010600180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:03 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:03 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:03 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000001630100024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:03 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000002000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:03 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000e00ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 989.109148][T19319] loop5: partition table partially beyond EOD, truncated [ 989.116578][T19319] loop5: p1 start 851968 is beyond EOD, truncated [ 989.123731][T19319] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 989.152773][T19426] loop1: detected capacity change from 0 to 90881 22:53:03 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50ae1d00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:04 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:04 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:04 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 989.153950][T19427] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 989.169977][T19429] loop4: detected capacity change from 0 to 90881 [ 989.188727][T19457] loop3: detected capacity change from 0 to 46593 22:53:04 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 989.213274][T19543] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 989.213583][T19429] loop4: p1 p3 p4 [ 989.230158][T19426] loop1: p1 p3 p4 [ 989.233398][T19429] loop4: p1 size 11290111 extends beyond EOD, truncated [ 989.235981][T19457] loop3: p1 p3 p4 [ 989.245203][T19426] loop1: p1 size 11290111 extends beyond EOD, truncated [ 989.248406][T19457] loop3: p1 size 11290111 extends beyond EOD, truncated 22:53:04 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6f010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 989.254156][T19553] loop5: detected capacity change from 0 to 69377 [ 989.263895][T19457] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 989.275090][T19426] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 989.283998][ T1439] loop3: p1 p3 p4 [ 989.286432][T19429] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 989.288050][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 989.302975][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 989.308862][T19553] loop5: p1 < > p3 p4 [ 989.314177][T19553] loop5: partition table partially beyond EOD, truncated [ 989.324115][T19553] loop5: p1 start 917504 is beyond EOD, truncated [ 989.330995][T19553] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 989.347341][T19426] loop1: detected capacity change from 0 to 90881 [ 989.353670][T19429] loop4: detected capacity change from 0 to 90881 [ 989.360674][T19457] loop3: detected capacity change from 0 to 46593 [ 989.372119][T19553] loop5: detected capacity change from 0 to 69377 [ 989.401837][T19429] loop4: p1 p3 p4 [ 989.401966][T19553] loop5: p1 < > p3 p4 [ 989.405720][T19429] loop4: p1 size 11290111 extends beyond EOD, [ 989.409652][T19553] loop5: partition table partially beyond EOD, truncated [ 989.409996][T19553] loop5: p1 start 917504 is beyond EOD, [ 989.416317][T19429] truncated [ 989.423328][T19553] truncated [ 989.424554][T19553] loop5: p4 size 3674243072 extends beyond EOD, [ 989.429884][T19426] loop1: p1 p3 p4 [ 989.432073][T19553] truncated [ 989.433961][T19429] loop4: p4 size 3674243072 extends beyond EOD, [ 989.435580][T19426] loop1: p1 size 11290111 extends beyond EOD, [ 989.441593][T19429] truncated [ 989.441845][ T1439] loop3: p1 p3 p4 [ 989.445309][T19426] truncated [ 989.447970][T19426] loop1: p4 size 3674243072 extends beyond EOD, [ 989.448547][ T1439] loop3: p1 size 11290111 extends beyond EOD, [ 989.454772][T19426] truncated [ 989.460958][ T1439] truncated [ 989.462891][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 989.498512][T19457] loop3: p1 p3 p4 [ 989.503040][T19457] loop3: p1 size 11290111 extends beyond EOD, truncated 22:53:04 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010700180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:04 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:04 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:04 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000f00ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:04 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000002500024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:04 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000000200024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:04 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:04 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 989.510796][T19457] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 989.526155][T19654] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 989.539651][T19658] loop5: detected capacity change from 0 to 69377 [ 989.558007][T19696] loop1: detected capacity change from 0 to 90881 22:53:04 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9e010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:04 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb6010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:04 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 989.572883][ T1439] loop5: p1 < > p3 p4 [ 989.576990][ T1439] loop5: partition table partially beyond EOD, truncated [ 989.588703][ T1439] loop5: p1 start 983040 is beyond EOD, truncated [ 989.593528][T19772] loop3: detected capacity change from 0 to 46849 [ 989.600428][T19696] loop1: p1 p3 p4 [ 989.602906][T19773] loop4: detected capacity change from 0 to 90881 [ 989.606447][T19696] loop1: p1 size 11290111 extends beyond EOD, truncated 22:53:04 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 989.623269][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 989.627835][T19778] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 989.642537][T19696] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 989.643153][T19658] loop5: p1 < > p3 p4 [ 989.653859][T19658] loop5: partition table partially beyond EOD, truncated [ 989.661021][T19658] loop5: p1 start 983040 is beyond EOD, truncated [ 989.668471][T19658] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 989.673145][T19773] loop4: p1 p3 p4 [ 989.676318][T19772] loop3: p1 p3 p4 [ 989.679840][T19773] loop4: p1 size 11290111 extends beyond EOD, truncated [ 989.689768][T19772] loop3: p1 size 11290111 extends beyond EOD, truncated [ 989.698609][T19773] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 989.706710][T19772] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 989.712755][T19696] loop1: detected capacity change from 0 to 90881 [ 989.724577][ T1439] loop3: p1 p3 p4 [ 989.728451][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 989.736383][T19696] loop1: p1 p3 p4 [ 989.736758][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 989.740238][T19696] loop1: p1 size 11290111 extends beyond EOD, truncated [ 989.755276][T19696] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 989.756398][T19658] loop5: detected capacity change from 0 to 69377 [ 989.773290][T19773] loop4: detected capacity change from 0 to 90881 [ 989.792175][T19658] loop5: p1 < > p3 p4 [ 989.796324][T19658] loop5: partition table partially beyond EOD, truncated [ 989.796607][T19772] loop3: detected capacity change from 0 to 46849 [ 989.803981][T19658] loop5: p1 start 983040 is beyond EOD, truncated [ 989.817284][T19658] loop5: p4 size 3674243072 extends beyond EOD, truncated 22:53:04 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010800180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:04 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:04 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1004000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 989.824951][T19773] loop4: p1 p3 p4 [ 989.828815][T19773] loop4: p1 size 11290111 extends beyond EOD, truncated [ 989.829458][ T1439] loop5: p1 < > p3 p4 [ 989.837069][T19773] loop4: p4 size 3674243072 extends beyond EOD, [ 989.840052][ T1439] loop5: partition table partially beyond EOD, truncated [ 989.841338][ T1439] loop5: p1 start 983040 is beyond EOD, [ 989.846417][T19773] truncated [ 989.862312][ T1439] truncated [ 989.866168][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated 22:53:04 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a001000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:04 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000002600024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:04 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000040200024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:04 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:04 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff8000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:04 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 989.881130][T19886] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 989.900702][T19899] loop1: detected capacity change from 0 to 90881 22:53:04 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:04 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:04 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 989.934253][T20001] loop4: detected capacity change from 0 to 90881 [ 989.940914][T19990] loop3: detected capacity change from 0 to 47105 [ 989.954288][T20003] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 989.966084][T19899] loop1: p1 p3 p4 [ 989.969981][T20001] loop4: p1 p3 p4 [ 989.970096][T19899] loop1: p1 size 11290111 extends beyond EOD, truncated [ 989.976062][T20001] loop4: p1 size 11290111 extends beyond EOD, truncated [ 989.982361][ T1439] loop3: p1 p3 p4 [ 989.988962][T20011] loop5: detected capacity change from 0 to 69377 [ 989.995776][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 990.000093][T20001] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 990.014749][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 990.015328][T19899] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 990.031377][ T1439] loop3: p1 p3 p4 [ 990.035301][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 990.043257][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 990.053685][T20011] loop5: p1 < > p3 p4 [ 990.057919][T20011] loop5: partition table partially beyond EOD, truncated [ 990.058815][T20001] loop4: detected capacity change from 0 to 90881 [ 990.065412][T20011] loop5: p1 start 1048576 is beyond EOD, truncated [ 990.074503][T19990] loop3: p1 p3 p4 [ 990.078841][T20011] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 990.084453][T19990] loop3: p1 size 11290111 extends beyond EOD, truncated [ 990.094703][T19899] loop1: detected capacity change from 0 to 90881 [ 990.098630][T19990] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 990.114274][T20001] loop4: p1 p3 p4 [ 990.118204][T20001] loop4: p1 size 11290111 extends beyond EOD, truncated [ 990.126452][T20001] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 990.127061][T19899] loop1: p1 p3 p4 [ 990.137498][T19899] loop1: p1 size 11290111 extends beyond EOD, truncated [ 990.146635][T19899] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 990.155134][T20011] loop5: detected capacity change from 0 to 69377 [ 990.168530][T19990] loop3: detected capacity change from 0 to 47105 [ 990.195716][ T1439] loop5: p1 < > p3 p4 [ 990.199907][ T1439] loop5: partition table partially beyond EOD, truncated [ 990.207503][ T1439] loop5: p1 start 1048576 is beyond EOD, truncated [ 990.214237][T19990] loop3: p1 p3 p4 [ 990.214572][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 990.218160][T19990] loop3: p1 size 11290111 extends beyond EOD, truncated [ 990.234526][T20011] loop5: p1 < > p3 p4 [ 990.234834][T19990] loop3: p4 size 3674243072 extends beyond EOD, truncated 22:53:05 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010900180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:05 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:05 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 990.238613][T20011] loop5: partition table partially beyond EOD, truncated [ 990.253043][T20011] loop5: p1 start 1048576 is beyond EOD, truncated [ 990.259861][T20011] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 990.274587][ T1439] loop3: p1 p3 p4 [ 990.280181][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated 22:53:05 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000612c00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:05 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000000300024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:05 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a001100ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:05 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:05 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 990.287990][T20114] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 990.288503][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 990.331976][T20135] loop3: detected capacity change from 0 to 47361 [ 990.338920][T20223] loop4: detected capacity change from 0 to 90881 22:53:05 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 990.348093][T20222] loop1: detected capacity change from 0 to 90881 [ 990.362298][T20135] loop3: p1 p3 p4 [ 990.367252][T20135] loop3: p1 size 11290111 extends beyond EOD, truncated [ 990.368765][T20223] loop4: p1 p3 p4 [ 990.377901][T20231] loop5: detected capacity change from 0 to 69377 [ 990.379516][T20223] loop4: p1 size 11290111 extends beyond EOD, truncated [ 990.387460][T20222] loop1: p1 p3 p4 [ 990.392752][T20223] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 990.395757][T20222] loop1: p1 size 11290111 extends beyond EOD, truncated [ 990.405701][T20135] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 990.411678][T20229] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 990.430141][T20222] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 990.431905][T20231] loop5: p1 < > p3 p4 [ 990.441576][T20231] loop5: partition table partially beyond EOD, truncated 22:53:05 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 990.446282][ T1439] loop3: p1 p3 p4 [ 990.453137][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 990.459243][T20231] loop5: p1 start 1114112 is beyond EOD, truncated [ 990.467576][T20223] loop4: detected capacity change from 0 to 90881 [ 990.470877][T20231] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 990.482011][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated 22:53:05 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 990.494694][T20222] loop1: detected capacity change from 0 to 90881 [ 990.513520][T20223] loop4: p1 p3 p4 [ 990.517771][T20223] loop4: p1 size 11290111 extends beyond EOD, truncated [ 990.524800][T20135] loop3: detected capacity change from 0 to 47361 [ 990.526984][T20337] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 990.532578][T20222] loop1: p1 p3 p4 22:53:05 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 990.549100][T20231] loop5: detected capacity change from 0 to 69377 [ 990.549416][T20223] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 990.560174][T20222] loop1: p1 size 11290111 extends beyond EOD, truncated [ 990.573288][T20222] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 990.581809][ T1439] loop3: p1 p3 p4 [ 990.585787][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 990.598038][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 990.607650][T20231] loop5: p1 < > p3 p4 [ 990.611785][T20231] loop5: partition table partially beyond EOD, truncated [ 990.620268][T20231] loop5: p1 start 1114112 is beyond EOD, truncated [ 990.624945][ T1439] loop3: p1 p3 p4 [ 990.630884][T20231] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 990.631207][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated 22:53:05 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010a00180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:05 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:05 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000000400024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:05 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000002e00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:05 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:05 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a001200ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 990.646521][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 990.656604][T20135] loop3: p1 p3 p4 [ 990.661018][T20135] loop3: p1 size 11290111 extends beyond EOD, truncated [ 990.668937][T20135] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 990.685436][T20443] loop4: detected capacity change from 0 to 90881 [ 990.687800][T20446] loop1: detected capacity change from 0 to 90881 [ 990.698628][T20449] loop5: detected capacity change from 0 to 69377 [ 990.699319][T20450] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 990.731959][T20443] loop4: p1 p3 p4 [ 990.734323][T20446] loop1: p1 p3 p4 [ 990.736031][T20443] loop4: p1 size 11290111 extends beyond EOD, truncated 22:53:05 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 990.739502][ T1439] loop5: p1 < > p3 p4 [ 990.748882][T20446] loop1: p1 size 11290111 extends beyond EOD, [ 990.750477][ T1439] loop5: partition table partially beyond EOD, truncated [ 990.754322][ T1439] loop5: p1 start 1179648 is beyond EOD, [ 990.756710][T20446] truncated [ 990.763783][ T1439] truncated [ 990.771489][T20446] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 990.781212][T20443] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 990.785655][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated 22:53:05 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 990.802183][T20503] loop3: detected capacity change from 0 to 47617 [ 990.807694][ T1439] loop5: p1 < > p3 p4 [ 990.812875][ T1439] loop5: partition table partially beyond EOD, truncated [ 990.826608][ T1439] loop5: p1 start 1179648 is beyond EOD, truncated [ 990.834276][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated 22:53:05 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 990.834459][T20556] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 990.851512][T20446] loop1: detected capacity change from 0 to 90881 [ 990.859604][T20443] loop4: detected capacity change from 0 to 90881 [ 990.866143][T20503] loop3: p1 p3 p4 [ 990.870432][T20503] loop3: p1 size 11290111 extends beyond EOD, truncated [ 990.878893][T20503] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 990.886404][T20449] loop5: p1 < > p3 p4 [ 990.890512][T20449] loop5: partition table partially beyond EOD, truncated [ 990.899388][T20446] loop1: p1 p3 p4 [ 990.899553][T20449] loop5: p1 start 1179648 is beyond EOD, truncated [ 990.905035][T20446] loop1: p1 size 11290111 extends beyond EOD, truncated [ 990.910607][T20449] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 990.918500][T20443] loop4: p1 p3 p4 [ 990.927952][T20443] loop4: p1 size 11290111 extends beyond EOD, truncated [ 990.932619][T20446] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 990.944262][T20443] loop4: p4 size 3674243072 extends beyond EOD, truncated 22:53:05 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:05 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:05 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000000500024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 990.960282][T20503] loop3: detected capacity change from 0 to 47617 [ 990.979922][T20449] loop5: detected capacity change from 0 to 69377 [ 990.995017][T20664] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 991.002049][T20503] loop3: p1 p3 p4 [ 991.010404][T20503] loop3: p1 size 11290111 extends beyond EOD, truncated [ 991.018902][ T1439] loop5: p1 < > p3 p4 [ 991.023144][ T1439] loop5: partition table partially beyond EOD, truncated [ 991.026248][T20503] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 991.030962][ T1439] loop5: p1 start 1179648 is beyond EOD, truncated [ 991.047850][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated 22:53:05 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010b00180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:05 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000003f00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:05 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:05 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 991.054674][T20719] loop1: detected capacity change from 0 to 90881 [ 991.062953][ T1439] loop5: p1 < > p3 p4 [ 991.067101][ T1439] loop5: partition table partially beyond EOD, truncated [ 991.075537][ T1439] loop5: p1 start 1179648 is beyond EOD, truncated [ 991.082785][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 991.092498][T20770] loop4: detected capacity change from 0 to 90881 [ 991.093006][T20719] loop1: p1 p3 p4 [ 991.107955][T20719] loop1: p1 size 11290111 extends beyond EOD, truncated [ 991.117173][T20449] loop5: p1 < > p3 p4 [ 991.118973][T20719] loop1: p4 size 3674243072 extends beyond EOD, [ 991.121264][T20449] loop5: partition table partially beyond EOD, truncated [ 991.121377][T20449] loop5: p1 start 1179648 is beyond EOD, [ 991.127631][T20719] truncated [ 991.134695][T20449] truncated [ 991.148088][T20772] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 991.161662][T20770] loop4: p1 p3 p4 [ 991.161921][T20449] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 991.165516][T20770] loop4: p1 size 11290111 extends beyond EOD, truncated [ 991.180725][T20774] loop3: detected capacity change from 0 to 47873 [ 991.187232][ T1439] loop5: p1 < > p3 p4 [ 991.191450][ T1439] loop5: partition table partially beyond EOD, truncated [ 991.194787][T20770] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 991.199144][ T1439] loop5: p1 start 1179648 is beyond EOD, truncated 22:53:06 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 991.217153][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 991.222834][T20774] loop3: p1 p3 p4 [ 991.228291][T20774] loop3: p1 size 11290111 extends beyond EOD, truncated [ 991.228560][T20719] loop1: detected capacity change from 0 to 90881 [ 991.237805][T20774] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 991.260802][T20770] loop4: detected capacity change from 0 to 90881 22:53:06 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a002500ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:06 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:06 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 991.272885][T20719] loop1: p1 p3 p4 [ 991.276805][T20719] loop1: p1 size 11290111 extends beyond EOD, truncated [ 991.281997][T20770] loop4: p1 p3 p4 [ 991.288593][T20719] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 991.293089][T20770] loop4: p1 size 11290111 extends beyond EOD, truncated [ 991.306594][T20880] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 22:53:06 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000004000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:06 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000000600024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:06 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 991.318849][T20770] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 991.322043][T20774] loop3: detected capacity change from 0 to 47873 [ 991.360610][T20924] loop5: detected capacity change from 0 to 69377 22:53:06 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 991.374024][T20985] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 991.382052][ T1439] loop3: p1 p3 p4 [ 991.389162][T20924] loop5: p1 < > p3 p4 [ 991.389520][ T1439] loop3: p1 size 11290111 extends beyond EOD, [ 991.393464][T20924] loop5: partition table partially beyond EOD, truncated [ 991.393928][T20924] loop5: p1 start 2424832 is beyond EOD, [ 991.399637][ T1439] truncated [ 991.415564][T20924] truncated [ 991.419576][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 991.420872][T20924] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 991.439475][T20774] loop3: p1 p3 p4 [ 991.443979][T20774] loop3: p1 size 11290111 extends beyond EOD, truncated [ 991.447366][T21030] loop4: detected capacity change from 0 to 90881 [ 991.455818][T21039] loop1: detected capacity change from 0 to 90881 [ 991.467551][T20774] loop3: p4 size 3674243072 extends beyond EOD, truncated 22:53:06 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010c00180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:06 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:06 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 991.486579][T20924] loop5: detected capacity change from 0 to 69377 [ 991.493706][T21030] loop4: p1 p3 p4 [ 991.497578][T21030] loop4: p1 size 11290111 extends beyond EOD, truncated [ 991.505729][T21030] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 991.513063][T21039] loop1: p1 p3 p4 [ 991.519549][T21039] loop1: p1 size 11290111 extends beyond EOD, truncated [ 991.525141][T20924] loop5: p1 < > p3 p4 [ 991.528257][ T1439] loop3: p1 p3 p4 [ 991.530659][T20924] loop5: partition table partially beyond EOD, truncated [ 991.542969][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 991.545184][T20924] loop5: p1 start 2424832 is beyond EOD, truncated [ 991.550930][T21039] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 991.566948][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 991.574097][T21096] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 22:53:06 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:06 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 991.574699][T20924] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 991.598929][T21030] loop4: detected capacity change from 0 to 90881 22:53:06 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a004800ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:06 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 991.629545][T21201] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 991.654265][T21030] loop4: p1 p3 p4 [ 991.654947][T21039] loop1: detected capacity change from 0 to 90881 [ 991.658193][T21030] loop4: p1 size 11290111 extends beyond EOD, truncated [ 991.672455][T21030] loop4: p4 size 3674243072 extends beyond EOD, truncated 22:53:06 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000004800024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:06 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 991.688893][T21272] loop5: detected capacity change from 0 to 69377 [ 991.696782][T21039] loop1: p1 p3 p4 [ 991.700781][T21039] loop1: p1 size 11290111 extends beyond EOD, truncated [ 991.720338][T21308] loop3: detected capacity change from 0 to 48129 [ 991.731379][T21039] loop1: p4 size 3674243072 extends beyond EOD, truncated 22:53:06 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000040600024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 991.738936][T21309] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 991.766759][T21308] loop3: p1 p3 p4 [ 991.770748][T21308] loop3: p1 size 11290111 extends beyond EOD, truncated [ 991.782889][T21272] loop5: p1 < > p3 p4 22:53:06 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:06 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 991.786966][T21272] loop5: partition table partially beyond EOD, truncated [ 991.794225][T21311] loop4: detected capacity change from 0 to 90881 [ 991.800072][T21414] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 991.805019][T21308] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 991.819994][T21272] loop5: p1 start 4718592 is beyond EOD, truncated [ 991.829346][T21272] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 991.832630][ T1439] loop3: p1 p3 p4 [ 991.840801][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 991.849067][T21311] loop4: p1 p3 p4 [ 991.852951][T21311] loop4: p1 size 11290111 extends beyond EOD, truncated [ 991.860425][T21433] loop1: detected capacity change from 0 to 90881 [ 991.870010][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 991.877440][T21311] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 991.885886][T21272] loop5: detected capacity change from 0 to 69377 [ 991.913967][T21433] loop1: p1 p3 p4 [ 991.917717][T21308] loop3: detected capacity change from 0 to 48129 [ 991.917823][T21433] loop1: p1 size 11290111 extends beyond EOD, truncated [ 991.931684][ T1439] loop5: p1 < > p3 p4 [ 991.933774][T21433] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 991.935823][ T1439] loop5: partition table partially beyond EOD, truncated [ 991.935962][ T1439] loop5: p1 start 4718592 is beyond EOD, [ 991.948726][T21311] loop4: detected capacity change from 0 to 90881 [ 991.950033][ T1439] truncated [ 991.957584][T21308] loop3: p1 p3 p4 [ 991.963017][ T1439] loop5: p4 size 3674243072 extends beyond EOD, [ 991.965565][T21308] loop3: p1 size 11290111 extends beyond EOD, [ 991.969641][ T1439] truncated [ 991.975989][T21308] truncated [ 991.989583][T21308] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 991.989614][T21272] loop5: p1 < > p3 p4 [ 991.989620][T21272] loop5: partition table partially beyond EOD, truncated 22:53:06 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010d00180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:06 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:06 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:06 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a004c00ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 992.008231][T21272] loop5: p1 start 4718592 is beyond EOD, truncated [ 992.011727][T21311] loop4: p1 p3 p4 [ 992.018916][T21433] loop1: detected capacity change from 0 to 90881 [ 992.019696][T21311] loop4: p1 size 11290111 extends beyond EOD, truncated [ 992.026050][T21272] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 992.036635][T21311] loop4: p4 size 3674243072 extends beyond EOD, truncated 22:53:06 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000004c00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:06 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:06 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 992.061460][T21523] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 992.073358][T21433] loop1: p1 p3 p4 [ 992.077260][T21433] loop1: p1 size 11290111 extends beyond EOD, truncated [ 992.085517][T21524] loop5: detected capacity change from 0 to 69377 [ 992.098132][T21561] loop3: detected capacity change from 0 to 48385 [ 992.105937][T21433] loop1: p4 size 3674243072 extends beyond EOD, truncated 22:53:06 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000000700024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 992.138888][T21631] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 992.149095][T21634] loop4: detected capacity change from 0 to 90881 [ 992.153193][ T1439] loop5: p1 < > p3 p4 [ 992.161401][ T1439] loop5: partition table partially beyond EOD, truncated [ 992.168618][T21561] loop3: p1 p3 p4 [ 992.175056][T21561] loop3: p1 size 11290111 extends beyond EOD, truncated [ 992.179165][ T1439] loop5: p1 start 4980736 is beyond EOD, truncated 22:53:07 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 992.184047][T21561] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 992.197388][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 992.202035][T21634] loop4: p1 p3 p4 [ 992.208515][T21634] loop4: p1 size 11290111 extends beyond EOD, truncated [ 992.212369][T21685] loop1: detected capacity change from 0 to 90881 [ 992.224463][T21524] loop5: p1 < > p3 p4 [ 992.228545][T21524] loop5: partition table partially beyond EOD, truncated 22:53:07 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 992.233924][T21634] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 992.237181][T21524] loop5: p1 start 4980736 is beyond EOD, truncated [ 992.248534][T21561] loop3: detected capacity change from 0 to 48385 [ 992.258497][T21524] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 992.267644][T21685] loop1: p1 p3 p4 [ 992.274482][T21685] loop1: p1 size 11290111 extends beyond EOD, truncated 22:53:07 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 992.283429][T21740] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 992.290516][T21685] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 992.302421][T21561] loop3: p1 p3 p4 [ 992.306316][T21561] loop3: p1 size 11290111 extends beyond EOD, truncated [ 992.307528][T21634] loop4: detected capacity change from 0 to 90881 [ 992.330507][T21524] loop5: detected capacity change from 0 to 69377 22:53:07 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 992.337121][T21561] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 992.353808][ T2932] loop4: p1 p3 p4 [ 992.358044][ T2932] loop4: p1 size 11290111 extends beyond EOD, truncated [ 992.359599][T21685] loop1: detected capacity change from 0 to 90881 [ 992.367287][ T2932] loop4: p4 size 3674243072 extends beyond EOD, truncated 22:53:07 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010e00180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:07 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:07 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a006800ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:07 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000005400024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:07 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 992.389505][T21634] loop4: p1 p3 p4 [ 992.393449][T21634] loop4: p1 size 11290111 extends beyond EOD, truncated [ 992.409630][T21634] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 992.410555][ T1439] loop3: p1 p3 p4 [ 992.421161][T21848] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 992.421449][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated 22:53:07 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:07 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 992.447310][T21685] loop1: p1 p3 p4 [ 992.451160][T21685] loop1: p1 size 11290111 extends beyond EOD, truncated [ 992.458613][T21854] loop5: detected capacity change from 0 to 69377 [ 992.459508][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 992.467239][T21685] loop1: p4 size 3674243072 extends beyond EOD, truncated 22:53:07 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000000800024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 992.502288][T21854] loop5: p1 < > p3 p4 [ 992.506395][T21854] loop5: partition table partially beyond EOD, truncated [ 992.515888][T21855] loop4: detected capacity change from 0 to 90881 [ 992.520645][T21854] loop5: p1 start 6815744 is beyond EOD, truncated [ 992.534274][T21854] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 992.545949][ T1439] loop5: p1 < > p3 p4 22:53:07 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 992.546115][T21958] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 992.550032][ T1439] loop5: partition table partially beyond EOD, truncated [ 992.570549][ T1439] loop5: p1 start 6815744 is beyond EOD, truncated [ 992.577925][T21855] loop4: p1 p3 p4 [ 992.584453][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 992.587255][T21855] loop4: p1 size 11290111 extends beyond EOD, truncated 22:53:07 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48020000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 992.600701][T22004] loop3: detected capacity change from 0 to 48641 [ 992.604688][T21855] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 992.608991][T22022] loop1: detected capacity change from 0 to 90881 [ 992.637611][T22068] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 22:53:07 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 992.638291][T21854] loop5: detected capacity change from 0 to 69377 [ 992.662618][ T1439] loop3: p1 p3 p4 [ 992.666529][T22022] loop1: p1 p3 p4 [ 992.676295][T22022] loop1: p1 size 11290111 extends beyond EOD, truncated [ 992.676562][T21855] loop4: detected capacity change from 0 to 90881 [ 992.683502][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 992.690024][T21854] loop5: p1 < > p3 p4 22:53:07 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 992.700740][T21854] loop5: partition table partially beyond EOD, truncated [ 992.709966][T22022] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 992.711005][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 992.720830][T21854] loop5: p1 start 6815744 is beyond EOD, truncated [ 992.738334][ T1439] loop3: p1 p3 p4 [ 992.738474][T22173] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 992.742743][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 992.754560][T21854] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 992.762738][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 992.775424][T21855] loop4: p1 p3 p4 [ 992.779411][T21855] loop4: p1 size 11290111 extends beyond EOD, truncated [ 992.783432][T22004] loop3: p1 p3 p4 [ 992.790630][T22022] loop1: detected capacity change from 0 to 90881 [ 992.791011][T21855] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 992.798362][T22004] loop3: p1 size 11290111 extends beyond EOD, truncated [ 992.812593][T22004] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 992.832000][T22022] loop1: p1 p3 p4 [ 992.835844][T22022] loop1: p1 size 11290111 extends beyond EOD, truncated [ 992.844519][T22022] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 992.869752][T22004] loop3: detected capacity change from 0 to 48641 [ 992.872799][ T1906] udevd[1906]: inotify_add_watch(7, /dev/loop4p3, 10) failed: No such file or directory [ 992.877169][ T2932] udevd[2932]: inotify_add_watch(7, /dev/loop4p1, 10) failed: No such file or directory [ 992.886988][ T2931] udevd[2931]: inotify_add_watch(7, /dev/loop4p4, 10) failed: No such file or directory [ 992.932761][ T1439] loop3: p1 p3 p4 [ 992.936690][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 992.944632][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 992.953854][ T1439] loop3: p1 p3 p4 [ 992.957856][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 992.965624][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 992.974663][T22004] loop3: p1 p3 p4 22:53:07 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02011000180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:07 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:07 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a006c00ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:07 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:07 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000005500024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:07 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000000900024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 992.978525][T22004] loop3: p1 size 11290111 extends beyond EOD, truncated [ 992.986373][T22004] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 993.005393][T22279] loop1: detected capacity change from 0 to 90881 [ 993.005849][T22280] loop4: detected capacity change from 0 to 90881 [ 993.014246][T22281] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 22:53:07 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 993.019016][T22282] loop5: detected capacity change from 0 to 69377 22:53:07 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x66030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 993.062169][T22280] loop4: p1 p3 p4 [ 993.065993][T22280] loop4: p1 size 11290111 extends beyond EOD, truncated [ 993.073265][T22279] loop1: p1 p3 p4 [ 993.074968][T22387] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 993.077110][T22279] loop1: p1 size 11290111 extends beyond EOD, truncated [ 993.092449][T22280] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 993.096949][ T1439] loop5: p1 < > p3 p4 22:53:07 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 993.107125][ T1439] loop5: partition table partially beyond EOD, truncated [ 993.117909][ T1439] loop5: p1 start 7077888 is beyond EOD, truncated [ 993.120025][T22279] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 993.129318][T22454] loop3: detected capacity change from 0 to 49153 [ 993.135494][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated 22:53:07 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 993.157574][T22491] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 993.158707][T22282] loop5: p1 < > p3 p4 [ 993.173443][T22282] loop5: partition table partially beyond EOD, truncated [ 993.181090][T22282] loop5: p1 start 7077888 is beyond EOD, truncated [ 993.187736][T22454] loop3: p1 p3 p4 [ 993.191820][T22454] loop3: p1 size 11290111 extends beyond EOD, truncated [ 993.194692][T22279] loop1: detected capacity change from 0 to 90881 22:53:08 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x16f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:08 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 993.207418][T22282] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 993.215134][T22280] loop4: detected capacity change from 0 to 90881 [ 993.220328][T22454] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 993.251730][T22279] loop1: p1 p3 p4 [ 993.255270][T22596] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 993.255696][T22279] loop1: p1 size 11290111 extends beyond EOD, truncated [ 993.277085][T22280] loop4: p1 p3 p4 [ 993.283107][T22280] loop4: p1 size 11290111 extends beyond EOD, truncated [ 993.294237][T22454] loop3: detected capacity change from 0 to 49153 [ 993.301019][T22280] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 993.309034][T22279] loop1: p4 size 3674243072 extends beyond EOD, truncated 22:53:08 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02011100180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:08 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a007400ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:08 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:08 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19e}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:08 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000000a00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:08 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000006000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 993.336940][ T1439] loop3: p1 p3 p4 [ 993.340788][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 993.348716][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 993.357585][T22454] loop3: p1 p3 p4 [ 993.361591][T22454] loop3: p1 size 11290111 extends beyond EOD, truncated [ 993.369156][T22454] loop3: p4 size 3674243072 extends beyond EOD, truncated 22:53:08 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:08 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 993.387810][T22703] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 993.393897][T22707] loop5: detected capacity change from 0 to 69377 [ 993.402571][T22706] loop4: detected capacity change from 0 to 90881 [ 993.406186][T22700] loop1: detected capacity change from 0 to 90881 [ 993.454817][T22812] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 993.467445][T22706] loop4: p1 p3 p4 [ 993.471353][T22706] loop4: p1 size 11290111 extends beyond EOD, truncated [ 993.479941][T22700] loop1: p1 p3 p4 [ 993.483854][ T1439] loop5: p1 < > p3 p4 [ 993.487957][ T1439] loop5: partition table partially beyond EOD, truncated [ 993.488780][T22706] loop4: p4 size 3674243072 extends beyond EOD, truncated 22:53:08 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:08 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 993.495861][T22700] loop1: p1 size 11290111 extends beyond EOD, truncated [ 993.505957][ T1439] loop5: p1 start 7602176 is beyond EOD, truncated [ 993.517337][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 993.523429][T22895] loop3: detected capacity change from 0 to 49409 [ 993.532951][T22707] loop5: p1 < > p3 p4 [ 993.534048][T22700] loop1: p4 size 3674243072 extends beyond EOD, [ 993.537033][T22707] loop5: partition table partially beyond EOD, [ 993.537038][T22700] truncated [ 993.549974][T22918] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 993.552917][T22707] truncated [ 993.555379][T22707] loop5: p1 start 7602176 is beyond EOD, truncated [ 993.575656][T22707] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 993.584202][T22895] loop3: p1 p3 p4 [ 993.588265][T22895] loop3: p1 size 11290111 extends beyond EOD, truncated [ 993.595606][T22706] loop4: detected capacity change from 0 to 90881 [ 993.609336][T22700] loop1: detected capacity change from 0 to 90881 [ 993.611710][T22895] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 993.630947][T22707] loop5: detected capacity change from 0 to 69377 [ 993.632491][ T1439] loop3: p1 p3 p4 [ 993.637668][T22706] loop4: p1 p3 p4 [ 993.642872][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 993.646736][T22706] loop4: p1 size 11290111 extends beyond EOD, truncated 22:53:08 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xab000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:08 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x248}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 993.653029][T22700] loop1: p1 p3 p4 [ 993.660513][T22706] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 993.670178][T22700] loop1: p1 size 11290111 extends beyond EOD, truncated [ 993.678094][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 993.686799][T22707] loop5: p1 < > p3 p4 [ 993.690918][T22707] loop5: partition table partially beyond EOD, truncated [ 993.691127][T22700] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 993.702732][T22707] loop5: p1 start 7602176 is beyond EOD, truncated [ 993.707693][T23022] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 993.724463][T22707] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 993.758704][T22895] loop3: detected capacity change from 0 to 49409 [ 993.769676][ T1439] loop5: p1 < > p3 p4 [ 993.773851][ T1439] loop5: partition table partially beyond EOD, truncated [ 993.781010][ T1439] loop5: p1 start 7602176 is beyond EOD, truncated [ 993.788156][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 993.831713][T22895] loop3: p1 p3 p4 [ 993.835599][T22895] loop3: p1 size 11290111 extends beyond EOD, truncated [ 993.843559][T22895] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 993.852417][ T1439] loop3: p1 p3 p4 [ 993.856175][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 993.864222][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated 22:53:08 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02011200180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:08 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000016000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:08 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:08 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000000b00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:08 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb6010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:08 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a007a00ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 993.944249][ T1439] loop3: p1 p3 p4 [ 993.955310][T23131] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 993.956852][T23133] loop4: detected capacity change from 0 to 90881 [ 993.967415][T23132] loop5: detected capacity change from 0 to 69377 [ 993.974285][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 993.982161][T23135] loop1: detected capacity change from 0 to 90881 22:53:08 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:08 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x302}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 993.989006][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 994.022990][T23238] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 994.035081][T23132] loop5: p1 < > p3 p4 [ 994.035097][T23133] loop4: p1 p3 p4 [ 994.035208][T23133] loop4: p1 size 11290111 extends beyond EOD, truncated [ 994.035629][T23135] loop1: p1 p3 p4 [ 994.039337][T23132] loop5: partition table partially beyond EOD, [ 994.044586][T23133] loop4: p4 size 3674243072 extends beyond EOD, [ 994.049992][T23132] truncated [ 994.051057][T23132] loop5: p1 start 7995392 is beyond EOD, [ 994.053770][T23133] truncated [ 994.064920][T23135] loop1: p1 size 11290111 extends beyond EOD, [ 994.066338][T23132] truncated [ 994.069921][T23135] truncated 22:53:08 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 994.081791][T23135] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 994.091508][T23132] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 994.107682][T23270] loop3: detected capacity change from 0 to 49665 22:53:08 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 994.136966][T23270] loop3: p1 p3 p4 [ 994.142203][T23132] loop5: detected capacity change from 0 to 69377 [ 994.142608][T23270] loop3: p1 size 11290111 extends beyond EOD, truncated [ 994.152703][T23133] loop4: detected capacity change from 0 to 90881 [ 994.164705][T23135] loop1: detected capacity change from 0 to 90881 [ 994.172591][T23347] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 994.185559][T23270] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 994.187745][T23132] loop5: p1 < > p3 p4 [ 994.196794][T23132] loop5: partition table partially beyond EOD, truncated [ 994.204206][T23132] loop5: p1 start 7995392 is beyond EOD, truncated [ 994.211684][T23135] loop1: p1 p3 p4 [ 994.212185][T23132] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 994.215539][T23133] loop4: p1 p3 p4 [ 994.227868][T23135] loop1: p1 size 11290111 extends beyond EOD, truncated 22:53:09 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000000c00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:09 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 994.238949][T23270] loop3: detected capacity change from 0 to 49665 [ 994.240317][T23133] loop4: p1 size 11290111 extends beyond EOD, truncated [ 994.246962][T23135] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 994.255501][ T1439] loop5: p1 < > p3 p4 [ 994.263795][ T1439] loop5: partition table partially beyond EOD, truncated [ 994.265105][T23133] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 994.278118][ T1439] loop5: p1 start 7995392 is beyond EOD, truncated [ 994.290741][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 994.311845][T23270] loop3: p1 p3 p4 [ 994.316214][T23270] loop3: p1 size 11290111 extends beyond EOD, truncated [ 994.326436][T23400] loop1: detected capacity change from 0 to 90881 [ 994.336177][ T1439] loop5: p1 < > p3 p4 [ 994.336604][T23270] loop3: p4 size 3674243072 extends beyond EOD, [ 994.340291][ T1439] loop5: partition table partially beyond EOD, [ 994.340290][T23270] truncated [ 994.346715][ T1439] truncated [ 994.362047][ T1439] loop5: p1 start 7995392 is beyond EOD, truncated [ 994.369294][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated 22:53:09 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201a307180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:09 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff8000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:09 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa90008000000002c6100024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:09 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a009000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:09 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 994.391917][T23400] loop1: p1 p3 p4 [ 994.395726][T23400] loop1: p1 size 11290111 extends beyond EOD, truncated [ 994.403493][T23400] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 994.422554][T23458] loop4: detected capacity change from 0 to 90881 [ 994.424775][T23460] loop5: detected capacity change from 0 to 69377 [ 994.433459][ T1439] loop3: p1 p3 p4 [ 994.440097][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 994.441301][T23455] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 994.448498][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 994.470349][T23400] loop1: detected capacity change from 0 to 90881 [ 994.472966][T23458] loop4: p1 p3 p4 [ 994.479527][T23460] loop5: p1 < > p3 p4 [ 994.480794][T23458] loop4: p1 size 11290111 extends beyond EOD, 22:53:09 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 994.485063][T23460] loop5: partition table partially beyond EOD, truncated [ 994.485834][T23460] loop5: p1 start 9437184 is beyond EOD, [ 994.491201][T23458] truncated [ 994.507062][T23460] truncated [ 994.510760][T23460] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 994.517388][T23458] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 994.525142][T23400] loop1: p1 p3 p4 [ 994.529059][T23400] loop1: p1 size 11290111 extends beyond EOD, truncated 22:53:09 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 994.539442][T23400] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 994.558208][T23566] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 994.580363][T23458] loop4: detected capacity change from 0 to 90881 [ 994.582598][T23592] loop3: detected capacity change from 0 to 17153 22:53:09 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000000d00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:09 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:09 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:09 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 994.588470][T23460] loop5: detected capacity change from 0 to 69377 [ 994.626919][T23674] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 994.643497][T23458] loop4: p1 p3 p4 [ 994.644105][ T1439] loop5: p1 < > p3 p4 [ 994.647369][T23458] loop4: p1 size 11290111 extends beyond EOD, truncated [ 994.651427][ T1439] loop5: partition table partially beyond EOD, truncated [ 994.654769][ T1439] loop5: p1 start 9437184 is beyond EOD, [ 994.661962][T23687] loop1: detected capacity change from 0 to 90881 [ 994.665480][ T1439] truncated [ 994.671462][T23592] loop3: p1 p3 p4 [ 994.680398][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 994.690448][T23592] loop3: p1 size 11290111 extends beyond EOD, truncated [ 994.699822][T23458] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 994.707921][T23460] loop5: p1 < > p3 p4 [ 994.712039][T23460] loop5: partition table partially beyond EOD, truncated [ 994.717108][T23592] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 994.720337][T23460] loop5: p1 start 9437184 is beyond EOD, truncated [ 994.726871][T23687] loop1: p1 p3 p4 22:53:09 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a00e100ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 994.738059][T23460] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 994.738950][T23687] loop1: p1 size 11290111 extends beyond EOD, truncated [ 994.760729][T23687] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 994.800351][T23592] loop3: detected capacity change from 0 to 17153 [ 994.803817][T23687] loop1: detected capacity change from 0 to 90881 [ 994.842272][T23592] loop3: p1 p3 p4 [ 994.842285][T23687] loop1: p1 p3 p4 [ 994.846307][T23592] loop3: p1 size 11290111 extends beyond EOD, truncated [ 994.850137][T23687] loop1: p1 size 11290111 extends beyond EOD, truncated [ 994.867072][T23687] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 994.868020][T23592] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 994.874885][T23781] loop5: detected capacity change from 0 to 69377 22:53:09 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201a607180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:09 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:09 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:09 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000006300024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:09 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000000e00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 994.890053][ T1439] loop3: p1 p3 p4 [ 994.896172][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 994.904284][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 994.914090][T23781] loop5: p1 < > p3 p4 [ 994.918175][T23781] loop5: partition table partially beyond EOD, truncated [ 994.927032][T23781] loop5: p1 start 14745600 is beyond EOD, truncated [ 994.930833][T23787] loop4: detected capacity change from 0 to 90881 22:53:09 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 994.941766][T23785] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 994.943132][T23781] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 994.962145][T23789] loop1: detected capacity change from 0 to 90881 [ 994.972351][T23787] loop4: p1 p3 p4 [ 994.976519][T23787] loop4: p1 size 11290111 extends beyond EOD, truncated [ 994.985596][T23787] loop4: p4 size 3674243072 extends beyond EOD, truncated 22:53:09 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 995.005164][T23789] loop1: p1 p3 p4 [ 995.014650][T23789] loop1: p1 size 11290111 extends beyond EOD, truncated [ 995.022461][T23781] loop5: detected capacity change from 0 to 69377 [ 995.022489][T23873] loop3: detected capacity change from 0 to 17921 [ 995.030696][T23789] loop1: p4 size 3674243072 extends beyond EOD, truncated 22:53:09 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:09 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 995.049634][T23787] loop4: detected capacity change from 0 to 90881 [ 995.056826][ T1439] loop5: p1 < > p3 p4 [ 995.059611][T23896] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 995.060917][ T1439] loop5: partition table partially beyond EOD, truncated [ 995.079750][ T1439] loop5: p1 start 14745600 is beyond EOD, truncated [ 995.087157][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 995.094567][T23873] loop3: p1 p3 p4 [ 995.098658][T23873] loop3: p1 size 11290111 extends beyond EOD, truncated [ 995.113741][T23787] loop4: p1 p3 p4 [ 995.116367][T23999] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 995.130875][T23873] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 995.130937][T23787] loop4: p1 size 11290111 extends beyond EOD, truncated [ 995.140195][T23781] loop5: p1 < > p3 p4 [ 995.149118][T23781] loop5: partition table partially beyond EOD, truncated [ 995.154601][T23789] loop1: detected capacity change from 0 to 90881 22:53:10 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000402ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:10 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:10 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 995.158534][T23781] loop5: p1 start 14745600 is beyond EOD, truncated [ 995.170500][T23781] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 995.175684][T23787] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 995.191776][T23873] loop3: detected capacity change from 0 to 17921 [ 995.201864][T23789] loop1: p1 p3 p4 [ 995.210999][T23789] loop1: p1 size 11290111 extends beyond EOD, truncated [ 995.225785][T23789] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 995.233402][ T1439] loop3: p1 p3 p4 [ 995.237288][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 995.244892][T24104] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 995.245861][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 995.265838][T24109] loop5: detected capacity change from 0 to 69377 [ 995.275982][ T1439] loop3: p1 p3 p4 [ 995.280087][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 995.290860][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 995.300950][T23873] loop3: p1 p3 p4 [ 995.304913][T23873] loop3: p1 size 11290111 extends beyond EOD, truncated [ 995.313107][T24109] loop5: p1 < > p3 p4 [ 995.313761][T23873] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 995.317194][T24109] loop5: partition table partially beyond EOD, truncated [ 995.317384][T24109] loop5: p1 start 33816576 is beyond EOD, truncated [ 995.338713][T24109] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 995.349904][ T1439] loop5: p1 < > p3 p4 [ 995.354126][ T1439] loop5: partition table partially beyond EOD, truncated 22:53:10 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201c507180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:10 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000006800024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:10 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:10 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000000f00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:10 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 995.361577][ T1439] loop5: p1 start 33816576 is beyond EOD, truncated [ 995.368933][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 995.378789][T24212] loop1: detected capacity change from 0 to 90881 [ 995.381395][T24215] loop4: detected capacity change from 0 to 90881 [ 995.399748][T24213] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 22:53:10 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 995.420035][T24240] loop3: detected capacity change from 0 to 25857 [ 995.432268][T24212] loop1: p1 p3 p4 [ 995.433192][T24215] loop4: p1 p3 p4 [ 995.436259][T24212] loop1: p1 size 11290111 extends beyond EOD, truncated [ 995.442964][T24215] loop4: p1 size 11290111 extends beyond EOD, truncated [ 995.448146][T24109] loop5: detected capacity change from 0 to 69377 22:53:10 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 995.463827][T24212] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 995.473745][T24215] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 995.484370][ T1439] loop3: p1 p3 p4 [ 995.488161][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 995.495528][T24109] loop5: p1 < > p3 p4 [ 995.495741][T24322] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 995.499604][T24109] loop5: partition table partially beyond EOD, truncated 22:53:10 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 995.499724][T24109] loop5: p1 start 33816576 is beyond EOD, truncated [ 995.526002][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 995.533060][T24109] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 995.549366][ T1439] loop3: p1 p3 p4 [ 995.549453][T24212] loop1: detected capacity change from 0 to 90881 [ 995.557743][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated 22:53:10 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000003ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:10 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 995.569341][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 995.577038][T24215] loop4: detected capacity change from 0 to 90881 [ 995.584090][T24212] loop1: p1 p3 p4 [ 995.589354][T24212] loop1: p1 size 11290111 extends beyond EOD, truncated [ 995.597701][T24240] loop3: p1 p3 p4 [ 995.604113][T24240] loop3: p1 size 11290111 extends beyond EOD, truncated 22:53:10 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2300}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 995.611176][T24426] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 995.612234][T24212] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 995.634168][T24240] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 995.635922][T24439] loop5: detected capacity change from 0 to 69377 [ 995.651041][T24215] loop4: p1 p3 p4 [ 995.658310][T24215] loop4: p1 size 11290111 extends beyond EOD, truncated 22:53:10 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 995.666767][T24215] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 995.685048][T24532] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 995.695269][T24240] loop3: detected capacity change from 0 to 25857 [ 995.697957][T24439] loop5: p1 < > p3 p4 [ 995.707521][T24439] loop5: partition table partially beyond EOD, truncated [ 995.721608][T24439] loop5: p1 start 50331648 is beyond EOD, truncated [ 995.737966][T24439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 995.745956][T24240] loop3: p1 p3 p4 [ 995.749876][T24240] loop3: p1 size 11290111 extends beyond EOD, truncated [ 995.757652][T24240] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 995.770648][T24439] loop5: detected capacity change from 0 to 69377 22:53:10 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201c807180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:10 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000006c00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:10 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000001000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:10 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:10 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 995.805330][ T1439] loop3: p1 p3 p4 [ 995.812813][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 995.818176][T24636] loop4: detected capacity change from 0 to 90881 [ 995.828430][T24439] loop5: p1 < > p3 p4 [ 995.832522][T24439] loop5: partition table partially beyond EOD, truncated [ 995.839823][T24640] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 995.840230][T24638] loop1: detected capacity change from 0 to 90881 [ 995.852529][T24439] loop5: p1 start 50331648 is beyond EOD, truncated [ 995.865766][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 995.871933][T24636] loop4: p1 p3 p4 [ 995.874047][T24439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 995.876846][T24636] loop4: p1 size 11290111 extends beyond EOD, truncated [ 995.892749][T24636] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 995.893408][T24638] loop1: p1 p3 p4 22:53:10 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:10 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000204ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:10 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 995.904676][T24638] loop1: p1 size 11290111 extends beyond EOD, truncated [ 995.913168][T24638] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 995.950666][T24636] loop4: detected capacity change from 0 to 90881 [ 995.958506][T24744] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 995.959706][ T1439] loop5: p1 < > p3 p4 [ 995.974263][ T1439] loop5: partition table partially beyond EOD, truncated [ 995.981805][T24638] loop1: detected capacity change from 0 to 90881 [ 995.983012][T24636] loop4: p1 p3 p4 [ 995.988660][ T1439] loop5: p1 start 50331648 is beyond EOD, truncated 22:53:10 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 995.993546][T24636] loop4: p1 size 11290111 extends beyond EOD, truncated [ 996.003293][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 996.011838][T24636] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 996.014959][T24778] loop3: detected capacity change from 0 to 26625 [ 996.032863][T24638] loop1: p1 p3 p4 [ 996.036840][T24638] loop1: p1 size 11290111 extends beyond EOD, truncated 22:53:10 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:10 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000007200024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:10 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 996.044659][T24638] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 996.058261][T24851] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 996.081085][ T1439] loop3: p1 p3 p4 [ 996.086085][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 996.094952][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 996.106479][T24778] loop3: p1 p3 p4 [ 996.110991][T24778] loop3: p1 size 11290111 extends beyond EOD, truncated [ 996.129370][T24778] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 996.132345][T24959] loop4: detected capacity change from 0 to 90881 [ 996.137187][T24958] loop5: detected capacity change from 0 to 69377 22:53:11 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201cd07180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:11 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000001100024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:11 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:11 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4802}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 996.163006][T24959] loop4: p1 p3 p4 [ 996.166865][T24959] loop4: p1 size 11290111 extends beyond EOD, truncated [ 996.174445][ T1439] loop5: p1 < > p3 p4 [ 996.177980][T24959] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 996.178527][ T1439] loop5: partition table partially beyond EOD, truncated [ 996.178597][ T1439] loop5: p1 start 67239936 is beyond EOD, truncated [ 996.199958][T24963] loop3: detected capacity change from 0 to 27905 [ 996.202860][T24965] loop1: detected capacity change from 0 to 90881 [ 996.210227][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 996.221645][T24967] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 996.234833][T24958] loop5: p1 < > p3 p4 [ 996.238900][T24958] loop5: partition table partially beyond EOD, truncated [ 996.242067][T24959] loop4: detected capacity change from 0 to 90881 [ 996.247361][T24965] loop1: p1 p3 p4 [ 996.252877][T24958] loop5: p1 start 67239936 is beyond EOD, truncated 22:53:11 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 996.256543][T24963] loop3: p1 p3 p4 [ 996.264644][T24958] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 996.274684][T24965] loop1: p1 size 11290111 extends beyond EOD, truncated [ 996.279766][T24963] loop3: p1 size 11290111 extends beyond EOD, truncated [ 996.289869][T24963] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 996.299733][ T1439] loop3: p1 p3 p4 [ 996.303752][T24959] loop4: p1 p3 p4 22:53:11 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 996.307852][T24959] loop4: p1 size 11290111 extends beyond EOD, truncated [ 996.315066][T24965] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 996.322461][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 996.329297][T24959] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 996.331325][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 996.346997][T25069] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 996.360136][T24958] loop5: detected capacity change from 0 to 69377 [ 996.367348][ T1439] loop3: p1 p3 p4 [ 996.371394][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 996.379571][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 996.393598][T24965] loop1: detected capacity change from 0 to 90881 [ 996.405357][T24958] loop5: p1 < > p3 p4 [ 996.409456][T24958] loop5: partition table partially beyond EOD, truncated [ 996.415431][T24963] loop3: detected capacity change from 0 to 27905 [ 996.417007][T24958] loop5: p1 start 67239936 is beyond EOD, truncated [ 996.433628][T24965] loop1: p1 p3 p4 [ 996.436178][T24958] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 996.437436][T24965] loop1: p1 size 11290111 extends beyond EOD, truncated [ 996.455302][T24965] loop1: p4 size 3674243072 extends beyond EOD, truncated 22:53:11 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000604ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:11 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:11 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000007400024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:11 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:11 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000001200024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 996.455899][ T1439] loop5: p1 < > p3 p4 [ 996.466596][ T1439] loop5: partition table partially beyond EOD, truncated [ 996.474304][ T1439] loop5: p1 start 67239936 is beyond EOD, truncated [ 996.474928][T24963] loop3: p1 p3 p4 [ 996.485926][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 996.492588][T24963] loop3: p1 size 11290111 extends beyond EOD, truncated [ 996.505010][T24963] loop3: p4 size 3674243072 extends beyond EOD, truncated 22:53:11 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 996.506862][T25176] loop4: detected capacity change from 0 to 90881 [ 996.519878][T25177] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 996.552109][T25233] loop1: detected capacity change from 0 to 90881 [ 996.559345][T25176] loop4: p1 p3 p4 22:53:11 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f02180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:11 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 996.559363][ T1439] loop5: p1 < > p3 p4 [ 996.564438][T25176] loop4: p1 size 11290111 extends beyond EOD, [ 996.567251][ T1439] loop5: partition table partially beyond EOD, truncated [ 996.578442][ T1439] loop5: p1 start 67239936 is beyond EOD, [ 996.580490][T25176] truncated [ 996.590206][ T1439] truncated [ 996.597490][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 996.600642][T25176] loop4: p4 size 3674243072 extends beyond EOD, truncated 22:53:11 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:11 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 996.616827][T25233] loop1: p1 p3 p4 [ 996.619591][T25284] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 996.620708][T25233] loop1: p1 size 11290111 extends beyond EOD, truncated [ 996.639923][T25289] loop3: detected capacity change from 0 to 179969 [ 996.647726][T25233] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 996.674802][T25286] loop5: detected capacity change from 0 to 69377 [ 996.682134][T25392] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 996.691741][T25289] loop3: p1 p3 p4 [ 996.697641][T25176] loop4: detected capacity change from 0 to 90881 [ 996.698145][T25289] loop3: p1 size 11290111 extends beyond EOD, truncated [ 996.714368][T25289] loop3: p4 size 3674243072 extends beyond EOD, truncated 22:53:11 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:11 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6f01}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 996.716448][T25233] loop1: detected capacity change from 0 to 90881 [ 996.729393][ T1439] loop5: p1 < > p3 p4 [ 996.733573][ T1439] loop5: partition table partially beyond EOD, truncated [ 996.740719][ T1439] loop5: p1 start 67502080 is beyond EOD, truncated [ 996.741974][T25176] loop4: p1 p3 p4 [ 996.751200][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 996.751658][T25176] loop4: p1 size 11290111 extends beyond EOD, truncated [ 996.772298][T25176] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 996.780650][T25286] loop5: p1 < > p3 p4 [ 996.784763][T25286] loop5: partition table partially beyond EOD, truncated [ 996.792297][T25233] loop1: p1 p3 p4 [ 996.792948][T25496] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 996.796216][T25233] loop1: p1 size 11290111 extends beyond EOD, truncated [ 996.808545][T25286] loop5: p1 start 67502080 is beyond EOD, truncated [ 996.818379][T25233] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 996.829079][T25289] loop3: detected capacity change from 0 to 179969 [ 996.831619][T25286] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 996.865122][T25289] loop3: p1 p3 p4 [ 996.869528][T25289] loop3: p1 size 11290111 extends beyond EOD, truncated [ 996.883367][T25289] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 996.891440][T25286] loop5: detected capacity change from 0 to 69377 [ 996.921852][ T1439] loop5: p1 < > p3 p4 [ 996.925939][ T1439] loop5: partition table partially beyond EOD, truncated [ 996.933450][ T1439] loop5: p1 start 67502080 is beyond EOD, truncated [ 996.940410][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 996.948831][T25286] loop5: p1 < > p3 p4 [ 996.952952][T25286] loop5: partition table partially beyond EOD, truncated [ 996.961687][T25286] loop5: p1 start 67502080 is beyond EOD, truncated [ 996.968688][T25286] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 996.980177][ T2932] udevd[2932]: inotify_add_watch(7, /dev/loop4p1, 10) failed: No such file or directory [ 996.983163][ T1906] udevd[1906]: inotify_add_watch(7, /dev/loop4p3, 10) failed: No such file or directory [ 996.991359][ T2835] udevd[2835]: inotify_add_watch(7, /dev/loop1p3, 10) failed: No such file or directory [ 997.002605][ T2953] udevd[2953]: inotify_add_watch(7, /dev/loop1p4, 10) failed: No such file or directory 22:53:11 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000005ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:11 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:11 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000007a00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:11 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000001c00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:11 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:11 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f03180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 997.010408][ T1966] udevd[1966]: inotify_add_watch(7, /dev/loop1p1, 10) failed: No such file or directory [ 997.029875][ T2931] udevd[2931]: inotify_add_watch(7, /dev/loop4p4, 10) failed: No such file or directory [ 997.041494][T25602] loop1: detected capacity change from 0 to 90881 [ 997.042747][T25600] loop3: detected capacity change from 0 to 245505 [ 997.058717][T25606] loop4: detected capacity change from 0 to 90881 [ 997.066078][T25605] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 997.082056][T25602] loop1: p1 p3 p4 [ 997.086042][T25602] loop1: p1 size 11290111 extends beyond EOD, truncated [ 997.092772][ T2931] loop3: p1 p3 p4 [ 997.097712][ T2931] loop3: p1 size 11290111 extends beyond EOD, truncated [ 997.107778][T25684] loop5: detected capacity change from 0 to 69377 22:53:11 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:11 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 997.116018][T25602] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 997.122907][T25711] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 997.128120][ T2931] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 997.138041][ T2932] loop4: p1 p3 p4 [ 997.147443][ T2932] loop4: p1 size 11290111 extends beyond EOD, truncated [ 997.158203][T25600] loop3: p1 p3 p4 [ 997.159004][ T2932] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 997.164112][T25600] loop3: p1 size 11290111 extends beyond EOD, truncated [ 997.177827][ T1439] loop5: p1 < > p3 p4 [ 997.179114][T25606] loop4: p1 p3 p4 [ 997.181956][ T1439] loop5: partition table partially beyond EOD, truncated [ 997.185795][T25606] loop4: p1 size 11290111 extends beyond EOD, truncated [ 997.193660][ T1439] loop5: p1 start 83886080 is beyond EOD, truncated [ 997.210065][T25600] loop3: p4 size 3674243072 extends beyond EOD, truncated 22:53:12 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f04180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 997.212000][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 997.219225][T25602] loop1: detected capacity change from 0 to 90881 [ 997.231713][T25606] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 997.233483][T25684] loop5: p1 < > p3 p4 [ 997.243521][T25684] loop5: partition table partially beyond EOD, truncated [ 997.257675][T25684] loop5: p1 start 83886080 is beyond EOD, truncated 22:53:12 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:12 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9e01}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 997.279523][T25684] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 997.289915][ T1439] loop5: p1 < > p3 p4 [ 997.294010][ T1439] loop5: partition table partially beyond EOD, truncated [ 997.304263][T25602] loop1: p1 p3 p4 [ 997.305956][T25819] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 997.308086][T25602] loop1: p1 size 11290111 extends beyond EOD, truncated 22:53:12 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb601}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 997.329626][ T1439] loop5: p1 start 83886080 is beyond EOD, truncated [ 997.336776][T25606] loop4: detected capacity change from 0 to 90881 [ 997.341342][T25602] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 997.345237][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 997.354386][T25816] loop3: detected capacity change from 0 to 264192 22:53:12 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000006ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:12 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 997.391807][T25606] loop4: p1 p3 p4 [ 997.396832][T25606] loop4: p1 size 11290111 extends beyond EOD, truncated [ 997.404844][T25606] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 997.414082][T25816] loop3: p1 p3 p4 [ 997.417983][T25816] loop3: p1 size 11290111 extends beyond EOD, truncated [ 997.425189][T25684] loop5: detected capacity change from 0 to 69377 [ 997.429550][T25816] loop3: p4 size 3674243072 extends beyond EOD, truncated 22:53:12 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000837f00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:12 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000031d00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:12 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:12 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 997.461833][T25926] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 997.485236][T25816] loop3: detected capacity change from 0 to 264192 [ 997.495499][T25929] loop1: detected capacity change from 0 to 90881 22:53:12 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 997.541727][T25816] loop3: p1 p3 p4 [ 997.554144][T26035] loop4: detected capacity change from 0 to 90881 [ 997.555411][T26034] loop5: detected capacity change from 0 to 69377 [ 997.560827][T25816] loop3: p1 size 11290111 extends beyond EOD, truncated [ 997.574051][T26037] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 997.575765][T25929] loop1: p1 p3 p4 [ 997.607939][T25929] loop1: p1 size 11290111 extends beyond EOD, truncated [ 997.621763][T26035] loop4: p1 p3 p4 [ 997.625762][ T1439] loop5: p1 < > p3 p4 [ 997.629820][ T1439] loop5: partition table partially beyond EOD, truncated [ 997.640236][T26035] loop4: p1 size 11290111 extends beyond EOD, truncated 22:53:12 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 997.652691][T25816] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 997.661806][ T1439] loop5: p1 start 100663296 is beyond EOD, truncated [ 997.680167][T25929] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 997.687707][T26035] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 997.688759][T26141] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 997.707121][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 997.728882][T26034] loop5: p1 < > p3 p4 [ 997.733067][T26034] loop5: partition table partially beyond EOD, truncated [ 997.740350][T26034] loop5: p1 start 100663296 is beyond EOD, truncated [ 997.753067][T26034] loop5: p4 size 3674243072 extends beyond EOD, truncated 22:53:12 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f05180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:12 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1dae50}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:12 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 997.783698][T25929] loop1: detected capacity change from 0 to 90881 [ 997.784140][T26035] loop4: detected capacity change from 0 to 90881 [ 997.808212][ T1439] loop5: p1 < > p3 p4 [ 997.812344][ T1439] loop5: partition table partially beyond EOD, truncated [ 997.821188][T26245] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 997.831137][ T1439] loop5: p1 start 100663296 is beyond EOD, truncated [ 997.841841][T25929] loop1: p1 p3 p4 [ 997.845758][T25929] loop1: p1 size 11290111 extends beyond EOD, truncated [ 997.854429][T26248] loop3: detected capacity change from 0 to 264192 [ 997.854564][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 997.872316][ T1906] loop4: p1 p3 p4 [ 997.876259][ T1906] loop4: p1 size 11290111 extends beyond EOD, truncated 22:53:12 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 997.893122][T26248] loop3: p1 p3 p4 [ 997.903605][ T1906] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 997.916295][T26248] loop3: p1 size 11290111 extends beyond EOD, truncated [ 997.926922][T25929] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 997.938619][T26034] loop5: detected capacity change from 0 to 69377 [ 997.944191][T26248] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 997.958948][T26035] loop4: p1 p3 p4 [ 997.971866][T26035] loop4: p1 size 11290111 extends beyond EOD, truncated [ 997.992968][T26034] loop5: p1 < > p3 p4 [ 997.997068][T26034] loop5: partition table partially beyond EOD, truncated [ 998.000807][T26035] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 998.016140][T26248] loop3: detected capacity change from 0 to 264192 [ 998.024052][T26034] loop5: p1 start 100663296 is beyond EOD, truncated [ 998.061687][T26034] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 998.074518][ T1439] loop5: p1 < > p3 p4 [ 998.078629][ T1439] loop5: partition table partially beyond EOD, truncated [ 998.086016][ T1439] loop5: p1 start 100663296 is beyond EOD, truncated [ 998.093403][T26248] loop3: p1 p3 p4 [ 998.104237][T26248] loop3: p1 size 11290111 extends beyond EOD, truncated 22:53:12 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000406ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:12 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:12 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000002000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:12 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:12 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa90008000000007f8300024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 998.115106][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 998.140106][T26355] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 998.140519][T26356] loop1: detected capacity change from 0 to 90881 [ 998.154733][T26248] loop3: p4 size 3674243072 extends beyond EOD, truncated 22:53:13 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:13 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 998.168682][T26360] loop4: detected capacity change from 0 to 90881 [ 998.196375][T26361] loop5: detected capacity change from 0 to 69377 22:53:13 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f06180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 998.232157][ T1906] loop4: p1 p3 p4 [ 998.236033][ T2932] loop1: p1 p3 p4 [ 998.239964][ T1906] loop4: p1 size 11290111 extends beyond EOD, truncated [ 998.250090][ T2932] loop1: p1 size 11290111 extends beyond EOD, truncated [ 998.257389][T26361] loop5: p1 < > p3 p4 [ 998.261467][T26361] loop5: partition table partially beyond EOD, truncated [ 998.271311][ T2932] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 998.278571][T26465] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 998.279516][ T1906] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 998.298321][T26361] loop5: p1 start 100925440 is beyond EOD, truncated [ 998.307275][T26468] loop3: detected capacity change from 0 to 264192 [ 998.315382][T26356] loop1: p1 p3 p4 [ 998.319304][T26356] loop1: p1 size 11290111 extends beyond EOD, truncated 22:53:13 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:13 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 998.337295][T26356] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 998.346798][T26361] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 998.352826][T26360] loop4: p1 p3 p4 [ 998.354278][T26468] loop3: p1 p3 p4 [ 998.360072][T26360] loop4: p1 size 11290111 extends beyond EOD, truncated [ 998.361930][T26468] loop3: p1 size 11290111 extends beyond EOD, truncated [ 998.396939][T26360] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 998.408726][ T1439] loop5: p1 < > p3 p4 [ 998.412858][ T1439] loop5: partition table partially beyond EOD, truncated [ 998.421601][T26356] loop1: detected capacity change from 0 to 90881 [ 998.426600][ T1439] loop5: p1 start 100925440 is beyond EOD, truncated [ 998.429706][T26468] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 998.450027][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 998.451885][T26572] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 998.469655][T26356] loop1: p1 p3 p4 [ 998.474072][T26356] loop1: p1 size 11290111 extends beyond EOD, truncated [ 998.492303][T26468] loop3: detected capacity change from 0 to 264192 22:53:13 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:13 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 998.494849][T26360] loop4: detected capacity change from 0 to 90881 [ 998.499121][T26356] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 998.515534][T26361] loop5: detected capacity change from 0 to 69377 22:53:13 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000007ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:13 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000002500024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:13 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1004000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 998.542136][T26360] loop4: p1 p3 p4 [ 998.545915][T26468] loop3: p1 p3 p4 [ 998.549709][T26468] loop3: p1 size 11290111 extends beyond EOD, truncated [ 998.560084][T26360] loop4: p1 size 11290111 extends beyond EOD, truncated [ 998.564382][T26468] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 998.567514][T26677] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 22:53:13 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:13 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000008900024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:13 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f07180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 998.587947][T26360] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 998.609424][T26725] loop1: detected capacity change from 0 to 90881 22:53:13 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xab}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 998.640821][T26783] loop5: detected capacity change from 0 to 69377 [ 998.647720][ T2932] loop1: p1 p3 p4 [ 998.655321][ T2932] loop1: p1 size 11290111 extends beyond EOD, truncated [ 998.671298][ T2932] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 998.675798][T26788] loop3: detected capacity change from 0 to 264192 [ 998.685738][T26791] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 998.700312][T26725] loop1: p1 p3 p4 [ 998.706821][T26792] loop4: detected capacity change from 0 to 90881 [ 998.707546][T26788] loop3: p1 p3 p4 [ 998.717455][ T1439] loop5: p1 < > p3 p4 [ 998.718441][T26725] loop1: p1 size 11290111 extends beyond EOD, [ 998.721661][ T1439] loop5: partition table partially beyond EOD, truncated [ 998.722199][T26788] loop3: p1 size 11290111 extends beyond EOD, 22:53:13 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 998.727849][T26725] truncated [ 998.734881][T26788] truncated [ 998.744373][T26725] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 998.748324][ T1439] loop5: p1 start 117440512 is beyond EOD, truncated [ 998.765050][T26788] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 998.770996][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 998.783541][T26783] loop5: p1 < > p3 p4 22:53:13 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 998.787645][T26783] loop5: partition table partially beyond EOD, truncated [ 998.795344][T26783] loop5: p1 start 117440512 is beyond EOD, truncated [ 998.804086][T26792] loop4: p1 p3 p4 [ 998.808093][T26792] loop4: p1 size 11290111 extends beyond EOD, truncated [ 998.823301][T26783] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 998.825054][T26788] loop3: detected capacity change from 0 to 264192 [ 998.832149][T26792] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 998.837738][T26725] loop1: detected capacity change from 0 to 90881 [ 998.851510][ T1439] loop5: p1 < > p3 p4 [ 998.855716][ T1439] loop5: partition table partially beyond EOD, truncated [ 998.863371][ T1439] loop5: p1 start 117440512 is beyond EOD, truncated [ 998.870218][T26897] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 998.870657][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 998.892119][T26788] loop3: p1 p3 p4 [ 998.895950][T26725] loop1: p1 p3 p4 [ 998.901131][T26788] loop3: p1 size 11290111 extends beyond EOD, truncated [ 998.903007][ T1966] udevd[1966]: inotify_add_watch(7, /dev/loop4p1, 10) failed: No such file or directory [ 998.909912][T26725] loop1: p1 size 11290111 extends beyond EOD, truncated [ 998.918853][ T2835] udevd[2835]: inotify_add_watch(7, /dev/loop4p3, 10) failed: No such file or directory 22:53:13 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:13 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x248}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 998.925860][ T2953] udevd[2953]: inotify_add_watch(7, /dev/loop4p4, 10) failed: No such file or directory [ 998.939753][T26788] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 998.955596][T26792] loop4: detected capacity change from 0 to 90881 [ 998.957455][T26725] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 998.963058][T26783] loop5: detected capacity change from 0 to 69377 22:53:13 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 998.993164][T27001] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 999.021794][ T1439] loop5: p1 < > p3 p4 [ 999.025946][ T1439] loop5: partition table partially beyond EOD, truncated [ 999.030978][T26792] loop4: p1 p3 p4 [ 999.033452][ T1439] loop5: p1 start 117440512 is beyond EOD, truncated [ 999.044817][T26792] loop4: p1 size 11290111 extends beyond EOD, truncated [ 999.075209][T26792] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 999.076728][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated 22:53:13 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000009ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:13 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f08180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:13 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000002600024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:13 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:13 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:13 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000009000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 999.094696][T26783] loop5: p1 < > p3 p4 [ 999.098806][T26783] loop5: partition table partially beyond EOD, truncated [ 999.105968][T26783] loop5: p1 start 117440512 is beyond EOD, truncated [ 999.114772][T26783] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 999.134461][T27110] loop1: detected capacity change from 0 to 90881 [ 999.135963][T27109] loop3: detected capacity change from 0 to 44801 [ 999.149490][T27111] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 999.171735][T27109] loop3: p1 p3 p4 [ 999.174039][T27110] loop1: p1 p3 p4 [ 999.175809][T27109] loop3: p1 size 11290111 extends beyond EOD, truncated [ 999.179819][T27110] loop1: p1 size 11290111 extends beyond EOD, truncated 22:53:14 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 999.187005][T27132] loop4: detected capacity change from 0 to 90881 [ 999.200505][T27110] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 999.208358][T27109] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 999.235058][T27194] loop5: detected capacity change from 0 to 69377 22:53:14 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x366}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 999.243541][T27132] loop4: p1 p3 p4 [ 999.254024][T27132] loop4: p1 size 11290111 extends beyond EOD, truncated [ 999.254122][T27110] loop1: detected capacity change from 0 to 90881 [ 999.269498][T27132] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 999.278318][ T1439] loop5: p1 < > p3 p4 [ 999.282539][ T1439] loop5: partition table partially beyond EOD, truncated 22:53:14 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 999.283509][T27222] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 999.291014][ T1439] loop5: p1 start 150994944 is beyond EOD, truncated [ 999.301869][T27109] loop3: detected capacity change from 0 to 44801 [ 999.310545][T27110] loop1: p1 p3 p4 [ 999.318902][T27110] loop1: p1 size 11290111 extends beyond EOD, truncated [ 999.321454][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 999.332778][T27110] loop1: p4 size 3674243072 extends beyond EOD, truncated 22:53:14 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:14 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000002e00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 999.349510][T27194] loop5: p1 < > p3 p4 [ 999.353620][T27194] loop5: partition table partially beyond EOD, truncated [ 999.360983][T27194] loop5: p1 start 150994944 is beyond EOD, truncated [ 999.369023][T27132] loop4: detected capacity change from 0 to 90881 [ 999.371744][T27194] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 999.376039][T27109] loop3: p1 p3 p4 [ 999.389162][T27109] loop3: p1 size 11290111 extends beyond EOD, truncated 22:53:14 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 999.393622][T27327] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 999.410144][T27109] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 999.423282][T27132] loop4: p1 p3 p4 [ 999.427245][T27132] loop4: p1 size 11290111 extends beyond EOD, truncated [ 999.437536][T27194] loop5: detected capacity change from 0 to 69377 [ 999.447946][T27132] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 999.455622][T27431] loop1: detected capacity change from 0 to 90881 [ 999.455668][T27430] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 999.481858][ T1439] loop5: p1 < > p3 p4 [ 999.485944][ T1439] loop5: partition table partially beyond EOD, truncated [ 999.487365][T27431] loop1: p1 p3 p4 [ 999.494738][ T1439] loop5: p1 start 150994944 is beyond EOD, truncated [ 999.498665][T27431] loop1: p1 size 11290111 extends beyond EOD, truncated [ 999.504784][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 999.511446][T27431] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 999.528592][ T1439] loop5: p1 < > p3 p4 [ 999.532732][ T1439] loop5: partition table partially beyond EOD, truncated [ 999.539883][ T1439] loop5: p1 start 150994944 is beyond EOD, truncated [ 999.548727][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 999.560216][T27194] loop5: p1 < > p3 p4 [ 999.561364][T27431] loop1: detected capacity change from 0 to 90881 [ 999.564305][T27194] loop5: partition table partially beyond EOD, truncated [ 999.564422][T27194] loop5: p1 start 150994944 is beyond EOD, truncated [ 999.585034][T27194] loop5: p4 size 3674243072 extends beyond EOD, truncated 22:53:14 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a00000aff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:14 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:14 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f09180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:14 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000059e00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:14 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 999.622003][T27431] loop1: p1 p3 p4 [ 999.625830][T27431] loop1: p1 size 11290111 extends beyond EOD, truncated [ 999.633789][T27431] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 999.642840][ T1439] loop5: p1 < > p3 p4 [ 999.646950][ T1439] loop5: partition table partially beyond EOD, truncated [ 999.654311][ T1439] loop5: p1 start 150994944 is beyond EOD, truncated [ 999.663470][T27537] loop3: detected capacity change from 0 to 110337 22:53:14 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000013000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 999.664558][T27539] loop4: detected capacity change from 0 to 90881 [ 999.673503][T27536] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 999.677119][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 999.705590][T27537] loop3: p1 p3 p4 [ 999.709555][T27537] loop3: p1 size 11290111 extends beyond EOD, truncated [ 999.717780][T27539] loop4: p1 p3 p4 22:53:14 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 999.718489][T27537] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 999.722791][T27539] loop4: p1 size 11290111 extends beyond EOD, truncated [ 999.748167][T27617] loop1: detected capacity change from 0 to 90881 [ 999.754986][T27539] loop4: p4 size 3674243072 extends beyond EOD, truncated 22:53:14 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 999.768186][T27537] loop3: detected capacity change from 0 to 110337 [ 999.782449][T27617] loop1: p1 p3 p4 [ 999.791175][T27617] loop1: p1 size 11290111 extends beyond EOD, truncated [ 999.802940][T27645] loop5: detected capacity change from 0 to 69377 [ 999.807613][T27617] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 999.818551][T27537] loop3: p1 p3 p4 [ 999.823948][T27647] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 999.824596][T27537] loop3: p1 size 11290111 extends beyond EOD, truncated [ 999.839248][T27539] loop4: detected capacity change from 0 to 90881 [ 999.844805][T27537] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 999.849661][ T1439] loop5: p1 < > p3 p4 [ 999.860179][ T1439] loop5: partition table partially beyond EOD, truncated [ 999.862871][T27617] loop1: detected capacity change from 0 to 90881 22:53:14 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0a180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:14 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 999.867599][ T1439] loop5: p1 start 167772160 is beyond EOD, truncated [ 999.881006][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 999.883036][T27539] loop4: p1 p3 p4 [ 999.893688][T27539] loop4: p1 size 11290111 extends beyond EOD, truncated [ 999.904524][ T1439] loop5: p1 < > p3 p4 [ 999.908466][T27539] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 999.908689][ T1439] loop5: partition table partially beyond EOD, truncated 22:53:14 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:14 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa900080000000001b600024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 999.909092][ T1439] loop5: p1 start 167772160 is beyond EOD, truncated [ 999.937678][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 999.944956][T27752] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 999.952541][T27617] loop1: p1 p3 p4 [ 999.964202][T27617] loop1: p1 size 11290111 extends beyond EOD, truncated [ 999.966766][T27754] loop3: detected capacity change from 0 to 175873 [ 999.973814][T27617] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 999.987346][T27645] loop5: p1 < > p3 p4 [ 999.991444][T27645] loop5: partition table partially beyond EOD, truncated [ 999.998722][T27645] loop5: p1 start 167772160 is beyond EOD, truncated [ 1000.006277][T27645] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1000.019157][T27856] loop4: detected capacity change from 0 to 90881 [ 1000.026914][ T2931] udevd[2931]: inotify_add_watch(7, /dev/loop4p3, 10) failed: No such file or directory [ 1000.036603][T27754] loop3: p1 p3 p4 [ 1000.046740][T27754] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1000.049033][T27645] loop5: detected capacity change from 0 to 69377 [ 1000.056785][T27754] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1000.068219][ T1966] udevd[1966]: inotify_add_watch(7, /dev/loop4p4, 10) failed: No such file or directory [ 1000.068251][ T1906] udevd[1906]: inotify_add_watch(7, /dev/loop4p1, 10) failed: No such file or directory [ 1000.069217][T27856] loop4: p1 p3 p4 [ 1000.091815][T27856] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1000.100001][T27856] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1000.101955][ T1439] loop5: p1 < > p3 p4 [ 1000.111243][ T1439] loop5: partition table partially beyond EOD, truncated [ 1000.118438][ T1439] loop5: p1 start 167772160 is beyond EOD, truncated 22:53:14 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a00000bff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:14 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:14 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:14 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa90008000000007f3800024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 1000.123509][T27754] loop3: detected capacity change from 0 to 175873 [ 1000.125892][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1000.140116][T27645] loop5: p1 < > p3 p4 [ 1000.144211][T27645] loop5: partition table partially beyond EOD, truncated [ 1000.151355][T27645] loop5: p1 start 167772160 is beyond EOD, truncated [ 1000.159317][T27645] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1000.165116][T27856] loop4: detected capacity change from 0 to 90881 [ 1000.173866][T27754] loop3: p1 p3 p4 [ 1000.177889][T27754] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1000.182316][T27861] loop1: detected capacity change from 0 to 90881 [ 1000.188396][T27754] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1000.200904][T27862] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1000.217709][T27856] loop4: p1 p3 p4 22:53:15 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1000.221799][T27856] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1000.229590][T27856] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1000.237941][ T2932] loop1: p1 p3 p4 [ 1000.243352][ T2932] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1000.257366][T27959] loop5: detected capacity change from 0 to 69377 [ 1000.267239][ T2932] loop1: p4 size 3674243072 extends beyond EOD, truncated 22:53:15 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0b180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:15 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:15 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa900080000000000c000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 1000.276304][T27967] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1000.290685][T27861] loop1: p1 p3 p4 [ 1000.299166][ T1439] loop5: p1 < > p3 p4 [ 1000.303405][ T1439] loop5: partition table partially beyond EOD, truncated [ 1000.310828][ T1439] loop5: p1 start 184549376 is beyond EOD, truncated [ 1000.310997][T27861] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1000.325040][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1000.325234][T27971] loop3: detected capacity change from 0 to 241409 [ 1000.334312][T27861] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1000.350259][T27959] loop5: p1 < > p3 p4 [ 1000.354427][T27959] loop5: partition table partially beyond EOD, truncated [ 1000.368557][T27959] loop5: p1 start 184549376 is beyond EOD, truncated 22:53:15 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1000.377208][T27959] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1000.392031][T27971] loop3: p1 p3 p4 [ 1000.399005][T27971] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1000.406910][T28073] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1000.415135][T27971] loop3: p4 size 3674243072 extends beyond EOD, truncated 22:53:15 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:15 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a00000cff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:15 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:15 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1000.418692][T27861] loop1: detected capacity change from 0 to 90881 [ 1000.435034][T28075] loop4: detected capacity change from 0 to 90881 [ 1000.466839][T28164] loop5: detected capacity change from 0 to 69377 [ 1000.485083][ T2932] loop4: p1 p3 p4 [ 1000.488874][ T1906] loop1: p1 p3 p4 [ 1000.493348][ T2932] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1000.497688][T27971] loop3: detected capacity change from 0 to 241409 [ 1000.500749][ T1906] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1000.511107][ T2932] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1000.516755][ T1906] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1000.521486][ T1439] loop5: p1 < > p3 p4 [ 1000.532509][ T1439] loop5: partition table partially beyond EOD, truncated [ 1000.535699][T28184] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1000.540263][ T1439] loop5: p1 start 201326592 is beyond EOD, truncated [ 1000.554578][T28075] loop4: p1 p3 p4 [ 1000.560148][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1000.569160][T27971] loop3: p1 p3 p4 [ 1000.569229][T28075] loop4: p1 size 11290111 extends beyond EOD, truncated 22:53:15 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0c180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:15 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1000.573676][T27971] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1000.581096][T27861] loop1: p1 p3 p4 [ 1000.589753][T27971] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1000.598749][T27861] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1000.601979][T28075] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1000.607176][T28164] loop5: p1 < > p3 p4 [ 1000.616688][T27861] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1000.617141][T28164] loop5: partition table partially beyond EOD, truncated 22:53:15 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000003f00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:15 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1000.617415][T28164] loop5: p1 start 201326592 is beyond EOD, truncated 22:53:15 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa900080000000005c400024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 1000.664318][T28290] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1000.676184][T28164] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1000.685707][ T1439] loop5: p1 < > p3 p4 [ 1000.689788][ T1439] loop5: partition table partially beyond EOD, truncated [ 1000.697480][ T1439] loop5: p1 start 201326592 is beyond EOD, truncated 22:53:15 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:15 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1000.711646][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1000.716125][T28345] loop3: detected capacity change from 0 to 264192 [ 1000.720161][T28306] loop1: detected capacity change from 0 to 90881 [ 1000.735070][T28361] loop4: detected capacity change from 0 to 90881 [ 1000.762532][T28399] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1000.772900][T28306] loop1: p1 p3 p4 [ 1000.774948][T28345] loop3: p1 p3 p4 [ 1000.778185][T28306] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1000.789279][T28361] loop4: p1 p3 p4 [ 1000.793605][T28361] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1000.803255][T28361] loop4: p4 size 3674243072 extends beyond EOD, truncated 22:53:15 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a00000dff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:15 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:15 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1000.806831][T28345] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1000.817573][T28306] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1000.820639][T28404] loop5: detected capacity change from 0 to 69377 [ 1000.840766][T28345] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1000.856605][T28361] loop4: detected capacity change from 0 to 90881 [ 1000.874654][T28306] loop1: detected capacity change from 0 to 90881 [ 1000.881456][T28506] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1000.881821][T28361] loop4: p1 p3 p4 [ 1000.893323][ T1439] loop5: p1 < > p3 p4 [ 1000.898310][T28361] loop4: p1 size 11290111 extends beyond EOD, [ 1000.901061][ T1439] loop5: partition table partially beyond EOD, truncated [ 1000.901367][ T1439] loop5: p1 start 218103808 is beyond EOD, [ 1000.907273][T28361] truncated [ 1000.914311][ T1439] truncated [ 1000.926172][T28361] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1000.932681][T28345] loop3: detected capacity change from 0 to 264192 [ 1000.935558][T28306] loop1: p1 p3 p4 [ 1000.940674][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1000.950642][T28306] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1000.959504][T28404] loop5: p1 < > p3 p4 [ 1000.963623][T28404] loop5: partition table partially beyond EOD, truncated 22:53:15 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa900080000000000ec00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:15 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1000.972959][T28345] loop3: p1 p3 p4 [ 1000.976854][T28345] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1000.979185][T28306] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1000.983985][T28404] loop5: p1 start 218103808 is beyond EOD, truncated [ 1001.003879][T28609] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1001.005917][T28345] loop3: p4 size 3674243072 extends beyond EOD, truncated 22:53:15 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0d180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:15 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:15 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000004000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:15 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1001.018367][T28404] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1001.032065][T28627] loop4: detected capacity change from 0 to 90881 [ 1001.063867][T28627] loop4: p1 p3 p4 [ 1001.067875][T28627] loop4: p1 size 11290111 extends beyond EOD, truncated 22:53:15 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x22000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1001.083983][T28404] loop5: detected capacity change from 0 to 69377 [ 1001.089832][T28627] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1001.096858][T28717] loop1: detected capacity change from 0 to 90881 [ 1001.104448][T28715] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 22:53:15 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa900080000000000ee00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:15 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1001.132008][ T1439] loop5: p1 < > p3 p4 [ 1001.136091][ T1439] loop5: partition table partially beyond EOD, truncated [ 1001.139241][T28799] loop3: detected capacity change from 0 to 264192 [ 1001.154006][T28717] loop1: p1 p3 p4 [ 1001.158041][ T1439] loop5: p1 start 218103808 is beyond EOD, truncated [ 1001.168049][T28717] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1001.178420][T28824] loop4: detected capacity change from 0 to 90881 [ 1001.179466][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1001.186974][T28717] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1001.201960][T28799] loop3: p1 p3 p4 [ 1001.205778][T28825] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1001.210654][T28799] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1001.225200][T28404] loop5: p1 < > p3 p4 [ 1001.227997][T28799] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1001.229286][T28404] loop5: partition table partially beyond EOD, truncated [ 1001.229621][T28404] loop5: p1 start 218103808 is beyond EOD, truncated [ 1001.250720][T28824] loop4: p1 p3 p4 [ 1001.254548][T28824] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1001.258620][T28404] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1001.270270][T28824] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1001.277349][T28717] loop1: detected capacity change from 0 to 90881 22:53:16 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a00000eff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:16 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x23000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:16 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4802}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1001.286436][T28799] loop3: detected capacity change from 0 to 264192 [ 1001.291882][ T1439] loop5: p1 < > p3 p4 [ 1001.297110][ T1439] loop5: partition table partially beyond EOD, truncated [ 1001.304503][ T1439] loop5: p1 start 218103808 is beyond EOD, truncated [ 1001.311378][T28930] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1001.311914][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1001.331701][T28799] loop3: p1 p3 p4 [ 1001.335794][T28717] loop1: p1 p3 p4 [ 1001.339660][T28717] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1001.345142][T28824] loop4: detected capacity change from 0 to 90881 [ 1001.349441][T28799] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1001.353878][T28717] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1001.370821][T28799] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1001.379549][T28824] loop4: p1 p3 p4 22:53:16 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000008004000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:16 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:16 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0e180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:16 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1001.383648][T28932] loop5: detected capacity change from 0 to 69377 [ 1001.392928][T28824] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1001.403316][T28824] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1001.416535][T29035] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 22:53:16 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000fffe00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:16 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1001.452628][T28932] loop5: p1 < > p3 p4 [ 1001.456727][T28932] loop5: partition table partially beyond EOD, truncated [ 1001.473216][T28932] loop5: p1 start 234881024 is beyond EOD, truncated [ 1001.473403][T29139] loop1: detected capacity change from 0 to 90881 [ 1001.484785][T28932] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1001.504737][T29143] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1001.510127][T29142] loop3: detected capacity change from 0 to 264192 [ 1001.517079][T29145] loop4: detected capacity change from 0 to 90881 [ 1001.531886][T29139] loop1: p1 p3 p4 [ 1001.536240][T29139] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1001.546787][T29139] loop1: p4 size 3674243072 extends beyond EOD, truncated 22:53:16 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:16 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6603}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1001.556385][T28932] loop5: detected capacity change from 0 to 69377 [ 1001.564553][ T2932] loop4: p1 p3 p4 [ 1001.564553][ T1439] loop3: p1 p3 p4 [ 1001.564744][ T2932] loop4: p1 size 11290111 extends beyond EOD, [ 1001.568593][ T1439] loop3: p1 size 11290111 extends beyond EOD, [ 1001.572007][ T2932] truncated [ 1001.579625][ T2932] loop4: p4 size 3674243072 extends beyond EOD, [ 1001.584331][ T1439] truncated [ 1001.597233][ T2932] truncated [ 1001.600833][T29248] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1001.615183][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1001.615730][T29145] loop4: p1 p3 p4 [ 1001.630782][ T1439] loop3: p1 p3 p4 [ 1001.635155][T28932] loop5: p1 < > p3 p4 [ 1001.635361][ T1439] loop3: p1 size 11290111 extends beyond EOD, [ 1001.639294][T28932] loop5: partition table partially beyond EOD, truncated 22:53:16 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1001.639449][T28932] loop5: p1 start 234881024 is beyond EOD, [ 1001.645488][ T1439] truncated [ 1001.647944][T29145] loop4: p1 size 11290111 extends beyond EOD, [ 1001.652527][T28932] truncated [ 1001.654392][T29139] loop1: detected capacity change from 0 to 90881 [ 1001.658595][T29145] truncated [ 1001.663625][T28932] loop5: p4 size 3674243072 extends beyond EOD, [ 1001.674204][ T1439] loop3: p4 size 3674243072 extends beyond EOD, [ 1001.677436][T28932] truncated [ 1001.680514][ T1439] truncated [ 1001.700633][T29145] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1001.708452][T29351] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1001.725329][T29139] loop1: p1 p3 p4 [ 1001.729470][T29139] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1001.737783][T29139] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1001.740419][T29142] loop3: p1 p3 p4 [ 1001.749053][T29142] loop3: p1 size 11290111 extends beyond EOD, truncated 22:53:16 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a00000fff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:16 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:16 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa90008000000000fff00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:16 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000014000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:16 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1001.757172][T29142] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1001.777061][T29440] loop4: detected capacity change from 0 to 90881 [ 1001.790377][ T1439] loop3: p1 p3 p4 [ 1001.794425][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1001.806428][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1001.813259][T29440] loop4: p1 p3 p4 [ 1001.815482][T29459] loop5: detected capacity change from 0 to 69377 [ 1001.817904][T29440] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1001.833804][T29460] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1001.847148][T29440] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1001.850765][T29463] loop1: detected capacity change from 0 to 90881 [ 1001.862166][T29459] loop5: p1 < > p3 p4 [ 1001.865517][T29142] loop3: detected capacity change from 0 to 264192 [ 1001.866237][T29459] loop5: partition table partially beyond EOD, truncated [ 1001.881131][T29459] loop5: p1 start 251658240 is beyond EOD, truncated [ 1001.881905][T29463] loop1: p1 p3 p4 [ 1001.888620][T29459] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1001.893489][T29463] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1001.901974][ T1439] loop5: p1 < > p3 p4 [ 1001.906649][T29463] loop1: p4 size 3674243072 extends beyond EOD, [ 1001.909714][ T1439] loop5: partition table partially beyond EOD, truncated [ 1001.913441][ T1439] loop5: p1 start 251658240 is beyond EOD, [ 1001.916258][T29463] truncated [ 1001.920447][T29440] loop4: detected capacity change from 0 to 90881 [ 1001.923432][ T1439] truncated [ 1001.924143][T29142] loop3: p1 p3 p4 [ 1001.930110][ T1439] loop5: p4 size 3674243072 extends beyond EOD, [ 1001.934305][T29142] loop3: p1 size 11290111 extends beyond EOD, [ 1001.938860][ T1439] truncated [ 1001.954988][T29463] loop1: detected capacity change from 0 to 90881 [ 1001.959103][T29142] truncated [ 1001.960727][T29142] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1001.973008][T29440] loop4: p1 p3 p4 [ 1001.983733][T29440] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1001.992020][T29440] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1001.997881][T29459] loop5: detected capacity change from 0 to 69377 22:53:16 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0f180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:16 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:16 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1002.006112][T29463] loop1: p1 p3 p4 [ 1002.010068][T29463] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1002.019750][T29463] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1002.020713][ T1439] loop3: p1 p3 p4 [ 1002.033815][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1002.038423][T29566] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 22:53:16 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000feff00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:16 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000004800024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 1002.042349][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1002.058906][T29459] loop5: p1 < > p3 p4 [ 1002.063675][T29459] loop5: partition table partially beyond EOD, truncated [ 1002.072987][T29459] loop5: p1 start 251658240 is beyond EOD, truncated [ 1002.080629][T29459] loop5: p4 size 3674243072 extends beyond EOD, truncated 22:53:16 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:16 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48020000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1002.108613][T29670] loop4: detected capacity change from 0 to 90881 [ 1002.117293][T29672] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1002.127287][T29674] loop1: detected capacity change from 0 to 90881 [ 1002.138232][T29670] loop4: p1 p3 p4 [ 1002.138387][ T1439] loop5: p1 < > p3 p4 [ 1002.144380][T29670] loop4: p1 size 11290111 extends beyond EOD, 22:53:16 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000011ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 1002.146234][ T1439] loop5: partition table partially beyond EOD, truncated [ 1002.153532][ T1439] loop5: p1 start 251658240 is beyond EOD, [ 1002.159504][T29670] truncated [ 1002.163310][T29572] loop3: detected capacity change from 0 to 264192 [ 1002.165519][ T1439] truncated [ 1002.170465][T29670] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1002.180029][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1002.188804][T29572] loop3: p1 p3 p4 [ 1002.196560][T29674] loop1: p1 p3 p4 22:53:17 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xab00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:17 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1002.204164][T29572] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1002.208674][T29674] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1002.213354][T29572] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1002.227659][T29674] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1002.246260][T29670] loop4: detected capacity change from 0 to 90881 22:53:17 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f10180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 1002.258700][T29779] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1002.277633][T29670] loop4: p1 p3 p4 [ 1002.285763][ T1906] udevd[1906]: inotify_add_watch(7, /dev/loop1p3, 10) failed: No such file or directory [ 1002.294228][T29670] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1002.296482][ T2931] udevd[2931]: inotify_add_watch(7, /dev/loop1p4, 10) failed: No such file or directory [ 1002.303392][ T2932] udevd[2932]: inotify_add_watch(7, /dev/loop1p1, 10) failed: No such file or directory [ 1002.314748][T29786] loop5: detected capacity change from 0 to 69377 [ 1002.323352][T29674] loop1: detected capacity change from 0 to 90881 [ 1002.335781][T29670] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1002.354335][T29786] loop5: p1 < > p3 p4 22:53:17 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50ae1d00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:17 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb601}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:17 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000000000034000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 1002.355740][T29830] loop3: detected capacity change from 0 to 40705 [ 1002.358455][T29786] loop5: partition table partially beyond EOD, truncated [ 1002.358701][T29786] loop5: p1 start 285212672 is beyond EOD, truncated [ 1002.382006][T29786] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1002.394953][ T1439] loop5: p1 < > p3 p4 [ 1002.399641][ T1439] loop5: partition table partially beyond EOD, truncated 22:53:17 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1002.409223][T29890] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1002.423776][T29674] loop1: p1 p3 p4 [ 1002.427674][T29674] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1002.435949][T29830] loop3: p1 p3 p4 [ 1002.438303][ T1439] loop5: p1 start 285212672 is beyond EOD, truncated [ 1002.439878][T29830] loop3: p1 size 11290111 extends beyond EOD, truncated 22:53:17 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1002.455478][T29674] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1002.459366][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1002.463746][T29830] loop3: p4 size 3674243072 extends beyond EOD, truncated 22:53:17 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000004a00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:17 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1002.499337][T29995] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1002.511278][T29786] loop5: detected capacity change from 0 to 69377 [ 1002.519207][T29998] loop4: detected capacity change from 0 to 90881 [ 1002.536117][T29830] loop3: detected capacity change from 0 to 40705 [ 1002.552019][T29998] loop4: p1 p3 p4 22:53:17 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1002.555963][T29998] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1002.565478][ T1439] loop5: p1 < > p3 p4 [ 1002.568328][T30101] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1002.569554][ T1439] loop5: partition table partially beyond EOD, truncated [ 1002.569683][ T1439] loop5: p1 start 285212672 is beyond EOD, [ 1002.581652][T29830] loop3: p1 p3 p4 [ 1002.588180][ T1439] truncated [ 1002.595714][T29830] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1002.604967][T29998] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1002.612598][T30103] loop1: detected capacity change from 0 to 90881 [ 1002.616892][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1002.628091][T29830] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1002.636481][ T1439] loop5: p1 < > p3 p4 [ 1002.640559][ T1439] loop5: partition table partially beyond EOD, truncated [ 1002.642111][T30103] loop1: p1 p3 p4 [ 1002.647812][ T1439] loop5: p1 start 285212672 is beyond EOD, truncated [ 1002.658180][T29998] loop4: detected capacity change from 0 to 90881 [ 1002.658492][T30103] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1002.668060][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1002.674872][T30103] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1002.688959][T29786] loop5: p1 < > p3 p4 [ 1002.693090][T29786] loop5: partition table partially beyond EOD, truncated [ 1002.700436][T29786] loop5: p1 start 285212672 is beyond EOD, truncated [ 1002.701808][T29998] loop4: p1 p3 p4 22:53:17 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000012ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:17 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:17 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f11180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:17 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:17 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000000000044000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 1002.707850][T29786] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1002.714699][T29998] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1002.727124][T29998] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1002.741150][T30227] loop3: detected capacity change from 0 to 106241 [ 1002.748105][T30103] loop1: detected capacity change from 0 to 90881 22:53:17 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:17 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6f010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1002.778215][T30312] loop5: detected capacity change from 0 to 69377 [ 1002.778969][T30103] loop1: p1 p3 p4 [ 1002.784841][ T1439] loop3: p1 p3 p4 [ 1002.793420][T30103] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1002.796495][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1002.803679][T30103] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1002.818607][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated 22:53:17 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1002.819393][T30333] loop4: detected capacity change from 0 to 90881 [ 1002.836451][T30312] loop5: p1 < > p3 p4 [ 1002.840547][T30312] loop5: partition table partially beyond EOD, truncated [ 1002.847784][T30227] loop3: p1 p3 p4 [ 1002.851642][T30227] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1002.859568][T30227] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1002.862152][T30312] loop5: p1 start 301989888 is beyond EOD, truncated 22:53:17 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000004c00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 1002.879624][ T1439] loop3: p1 p3 p4 [ 1002.885991][T30333] loop4: p1 p3 p4 [ 1002.886013][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1002.891188][T30333] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1002.898140][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1002.907137][T30312] loop5: p4 size 3674243072 extends beyond EOD, truncated 22:53:17 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:17 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1002.923575][T30333] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1002.940460][T30465] loop1: detected capacity change from 0 to 90881 [ 1002.962550][T30312] loop5: detected capacity change from 0 to 69377 [ 1002.969041][T30227] loop3: detected capacity change from 0 to 106241 22:53:17 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1002.983394][ T1966] loop1: p1 p3 p4 [ 1002.987451][ T1966] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1002.995961][ T2932] udevd[2932]: inotify_add_watch(7, /dev/loop4p1, 10) failed: No such file or directory [ 1002.999855][ T1966] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1003.010758][T30333] loop4: detected capacity change from 0 to 90881 [ 1003.020807][T30312] loop5: p1 < > p3 p4 [ 1003.024913][T30312] loop5: partition table partially beyond EOD, truncated [ 1003.032528][T30312] loop5: p1 start 301989888 is beyond EOD, truncated [ 1003.033866][T30465] loop1: p1 p3 p4 [ 1003.046232][T30333] loop4: p1 p3 p4 [ 1003.047777][T30312] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1003.050361][T30333] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1003.057286][T30465] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1003.072351][T30333] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1003.076033][T30465] loop1: p4 size 3674243072 extends beyond EOD, truncated 22:53:17 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000020ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:17 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f12180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:17 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:17 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000000000054000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:17 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:17 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000025200024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 1003.113017][ T1439] loop5: p1 < > p3 p4 [ 1003.117206][ T1439] loop5: partition table partially beyond EOD, truncated [ 1003.124794][T30632] loop3: detected capacity change from 0 to 171777 [ 1003.139237][ T1439] loop5: p1 start 301989888 is beyond EOD, truncated [ 1003.151175][T30709] loop4: detected capacity change from 0 to 90881 [ 1003.159445][T30632] loop3: p1 p3 p4 22:53:18 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1003.160748][T30737] loop1: detected capacity change from 0 to 90881 [ 1003.164956][T30632] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1003.169956][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1003.178199][T30632] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1003.203397][T30737] loop1: p1 p3 p4 [ 1003.203860][T30709] loop4: p1 p3 p4 22:53:18 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9e010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:18 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:18 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb6010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1003.207441][T30737] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1003.211256][T30709] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1003.219870][T30737] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1003.232441][T30709] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1003.251506][T30632] loop3: detected capacity change from 0 to 171777 22:53:18 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1003.290570][T30921] loop5: detected capacity change from 0 to 69377 [ 1003.293825][ T1439] loop3: p1 p3 p4 [ 1003.299719][T30709] loop4: detected capacity change from 0 to 90881 [ 1003.301361][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1003.317110][T30737] loop1: detected capacity change from 0 to 90881 [ 1003.325965][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1003.333743][T30709] loop4: p1 p3 p4 22:53:18 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1003.337645][T30709] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1003.346027][T30921] loop5: p1 < > p3 p4 [ 1003.350103][T30921] loop5: partition table partially beyond EOD, truncated [ 1003.359195][ T1439] loop3: p1 p3 p4 [ 1003.362469][T30921] loop5: p1 start 536870912 is beyond EOD, truncated [ 1003.363961][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1003.377663][T30709] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1003.386268][T30737] loop1: p1 p3 p4 [ 1003.387142][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1003.390245][T30737] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1003.404893][T30921] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1003.412043][T30737] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1003.413928][T30632] loop3: p1 p3 p4 [ 1003.423991][T30632] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1003.431880][T30632] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1003.461029][T30921] loop5: detected capacity change from 0 to 69377 [ 1003.502734][ T1439] loop5: p1 < > p3 p4 [ 1003.507240][ T1439] loop5: partition table partially beyond EOD, truncated [ 1003.514597][ T1439] loop5: p1 start 536870912 is beyond EOD, truncated [ 1003.522098][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1003.530585][T30921] loop5: p1 < > p3 p4 [ 1003.535445][T30921] loop5: partition table partially beyond EOD, truncated [ 1003.542650][T30921] loop5: p1 start 536870912 is beyond EOD, truncated [ 1003.549823][T30921] loop5: p4 size 3674243072 extends beyond EOD, truncated 22:53:18 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a00e121ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:18 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd1000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:18 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:18 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000000000074000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:18 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000005400024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:18 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f1c180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:18 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000025ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 1003.602049][T31161] loop4: detected capacity change from 0 to 90881 [ 1003.604886][T31163] loop1: detected capacity change from 0 to 90881 [ 1003.615596][T31164] loop3: detected capacity change from 0 to 264192 [ 1003.641950][ T1906] loop4: p1 p3 p4 22:53:18 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1003.646140][ T1906] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1003.663894][ T2931] loop3: p1 p3 p4 [ 1003.665389][T31272] loop5: detected capacity change from 0 to 69377 [ 1003.667773][ T2932] loop1: p1 p3 p4 [ 1003.675112][ T1906] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1003.678773][ T2931] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1003.694042][T31161] loop4: p1 p3 p4 22:53:18 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1003.698046][T31161] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1003.698111][ T2932] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1003.708449][T31161] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1003.738349][ T2931] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1003.746728][ T1966] loop5: p1 < > p3 p4 22:53:18 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:18 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000000000084000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:18 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1003.750805][ T1966] loop5: partition table partially beyond EOD, truncated [ 1003.767322][T31164] loop3: p1 p3 p4 [ 1003.767361][ T2932] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1003.772839][T31164] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1003.782868][ T1966] loop5: p1 start 620756992 is beyond EOD, truncated [ 1003.792172][T31164] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1003.804640][ T1966] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1003.805181][T31163] loop1: p1 p3 p4 [ 1003.816940][T31163] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1003.842239][T31382] loop4: detected capacity change from 0 to 90881 [ 1003.849927][T31272] loop5: p1 < > p3 p4 22:53:18 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f25180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:18 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff8000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:18 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1003.854139][T31272] loop5: partition table partially beyond EOD, truncated [ 1003.865172][T31272] loop5: p1 start 620756992 is beyond EOD, truncated [ 1003.875963][T31272] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1003.886600][T31163] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1003.912785][T31382] loop4: p1 p3 p4 [ 1003.915699][T31408] loop3: detected capacity change from 0 to 264192 [ 1003.916909][T31382] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1003.941387][T31163] loop1: detected capacity change from 0 to 90881 [ 1003.943465][T31408] loop3: p1 p3 p4 [ 1003.955895][T31272] loop5: detected capacity change from 0 to 69377 22:53:18 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f26180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 1003.962756][T31382] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1003.964113][T31408] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1003.979639][T31408] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1004.012405][T31163] loop1: p1 p3 p4 [ 1004.013273][ T1439] loop5: p1 < > p3 p4 [ 1004.016202][T31163] loop1: p1 size 11290111 extends beyond EOD, [ 1004.020200][ T1439] loop5: partition table partially beyond EOD, truncated [ 1004.024089][ T1439] loop5: p1 start 620756992 is beyond EOD, [ 1004.026386][T31163] truncated [ 1004.033393][ T1439] truncated [ 1004.040663][T31382] loop4: detected capacity change from 0 to 90881 [ 1004.048555][T31163] loop1: p4 size 3674243072 extends beyond EOD, truncated 22:53:18 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000005500024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:18 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1004.059374][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1004.076432][T31272] loop5: p1 < > p3 p4 [ 1004.080585][T31272] loop5: partition table partially beyond EOD, truncated [ 1004.082023][T31382] loop4: p1 p3 p4 [ 1004.089156][T31272] loop5: p1 start 620756992 is beyond EOD, truncated [ 1004.092327][T31382] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1004.098926][T31272] loop5: p4 size 3674243072 extends beyond EOD, truncated 22:53:18 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:18 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000040ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:18 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f2e180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:18 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:18 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000000000094000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 1004.108765][T31382] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1004.125751][T31670] loop3: detected capacity change from 0 to 264192 [ 1004.129671][T31592] loop1: detected capacity change from 0 to 90881 22:53:18 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1004.161321][ T2835] loop1: p1 p3 p4 [ 1004.165358][ T2835] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1004.174472][T31670] loop3: p1 p3 p4 [ 1004.176303][ T2835] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1004.178675][T31670] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1004.195886][T31592] loop_reread_partitions: partition scan of loop1 () failed (rc=-16) 22:53:19 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000015600024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:19 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1004.214001][T31732] loop5: detected capacity change from 0 to 69377 [ 1004.214169][T31741] loop4: detected capacity change from 0 to 90881 [ 1004.231402][T31670] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1004.248624][ T1439] loop3: p1 p3 p4 [ 1004.253724][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated 22:53:19 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1004.264765][T31741] loop4: p1 p3 p4 [ 1004.267442][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1004.273590][T31741] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1004.286717][T31741] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1004.288143][T31732] loop5: p1 < > p3 p4 [ 1004.298192][T31732] loop5: partition table partially beyond EOD, truncated [ 1004.307461][T31732] loop5: p1 start 1073741824 is beyond EOD, truncated 22:53:19 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:19 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1004.315018][T31670] loop3: detected capacity change from 0 to 264192 [ 1004.322876][T31732] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1004.336255][T31844] loop1: detected capacity change from 0 to 90881 [ 1004.358830][T31741] loop4: detected capacity change from 0 to 90881 [ 1004.372178][ T1439] loop3: p1 p3 p4 [ 1004.377324][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1004.390736][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1004.390949][T31732] loop5: detected capacity change from 0 to 69377 [ 1004.400208][T31844] loop1: p1 p3 p4 [ 1004.406706][T31741] loop4: p1 p3 p4 [ 1004.408984][T31844] loop1: p1 size 11290111 extends beyond EOD, truncated 22:53:19 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:19 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1004.419412][T31741] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1004.429272][ T1439] loop3: p1 p3 p4 [ 1004.434216][T31844] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1004.443448][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1004.450875][T31741] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1004.458295][T31732] loop5: p1 < > p3 p4 [ 1004.462410][T31732] loop5: partition table partially beyond EOD, truncated [ 1004.471971][T31732] loop5: p1 start 1073741824 is beyond EOD, truncated [ 1004.478968][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1004.484065][T31732] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1004.496227][T31670] loop3: p1 p3 p4 [ 1004.500121][T31670] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1004.508885][T31670] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1004.516416][T31844] loop1: detected capacity change from 0 to 90881 22:53:19 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000048ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:19 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f48180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:19 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:19 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa90008000000000000000a4000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:19 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1004.542937][ T1439] loop5: p1 < > p3 p4 [ 1004.547032][ T1439] loop5: partition table partially beyond EOD, truncated [ 1004.554514][ T1439] loop5: p1 start 1073741824 is beyond EOD, truncated [ 1004.559125][T31844] loop1: p1 p3 p4 [ 1004.568363][T31844] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1004.570588][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1004.584293][T32131] loop4: detected capacity change from 0 to 90881 [ 1004.588412][T31844] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1004.605451][T32146] loop3: detected capacity change from 0 to 12033 22:53:19 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000025600024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:19 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:19 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000001000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1004.643010][T32146] loop3: p1 p3 p4 [ 1004.647012][T32153] loop5: detected capacity change from 0 to 69377 [ 1004.652306][T32146] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1004.653961][T32131] loop4: p1 p3 p4 [ 1004.662240][T32146] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1004.673209][T32131] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1004.683282][T32131] loop4: p4 size 3674243072 extends beyond EOD, truncated 22:53:19 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:19 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1004.696096][ T1439] loop4: p1 p3 p4 [ 1004.701895][ T1439] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1004.704485][T32330] loop1: detected capacity change from 0 to 90881 [ 1004.715351][T32153] loop5: p1 < > p3 p4 [ 1004.719522][T32153] loop5: partition table partially beyond EOD, truncated [ 1004.728691][ T1439] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1004.733379][T32153] loop5: p1 start 1207959552 is beyond EOD, truncated [ 1004.743465][T32146] loop3: detected capacity change from 0 to 12033 [ 1004.751321][T32153] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1004.763238][T32330] loop1: p1 p3 p4 [ 1004.767738][T32330] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1004.775524][T32131] loop4: detected capacity change from 0 to 90881 [ 1004.783877][T32146] loop3: p1 p3 p4 [ 1004.787938][T32146] loop3: p1 size 11290111 extends beyond EOD, truncated 22:53:19 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:19 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1004.796750][T32153] loop5: detected capacity change from 0 to 69377 [ 1004.811802][T32330] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1004.824412][T32146] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1004.829024][ T1439] loop1: p1 p3 p4 [ 1004.836669][ T1439] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1004.844100][T32153] loop5: p1 < > p3 p4 [ 1004.846953][ T1439] loop1: p4 size 3674243072 extends beyond EOD, [ 1004.848318][T32153] loop5: partition table partially beyond EOD, truncated [ 1004.854924][T32153] loop5: p1 start 1207959552 is beyond EOD, [ 1004.861721][ T1439] truncated [ 1004.870901][T32153] truncated [ 1004.874137][T32131] loop4: p1 p3 p4 [ 1004.877757][T32153] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1004.878381][T32131] loop4: p1 size 11290111 extends beyond EOD, truncated 22:53:19 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a00004cff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:19 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:19 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f4c180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:19 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:19 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000000000144000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:19 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000025f00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 1004.898756][T32131] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1004.919919][ T1439] loop3: p1 p3 p4 [ 1004.927828][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1004.937359][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated 22:53:19 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1004.960677][T32619] loop1: detected capacity change from 0 to 90881 [ 1004.971907][T32654] loop5: detected capacity change from 0 to 69377 [ 1004.980548][T32660] loop3: detected capacity change from 0 to 264192 [ 1005.002463][ T1439] loop1: p1 p3 p4 [ 1005.006415][ T1439] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1005.007628][T32720] loop4: detected capacity change from 0 to 90881 [ 1005.020494][T32654] loop5: p1 < > p3 p4 [ 1005.021491][T32660] loop3: p1 p3 p4 [ 1005.024616][T32654] loop5: partition table partially beyond EOD, truncated [ 1005.028574][T32660] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1005.036260][T32654] loop5: p1 start 1275068416 is beyond EOD, truncated [ 1005.046144][T32660] loop3: p4 size 3674243072 extends beyond EOD, truncated 22:53:19 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:19 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xab}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1005.052150][ T1439] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1005.059696][T32654] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1005.076636][T32619] loop1: p1 p3 p4 [ 1005.081615][T32619] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1005.091789][T32720] loop4: p1 p3 p4 [ 1005.096303][T32619] loop1: p4 size 3674243072 extends beyond EOD, truncated 22:53:19 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:19 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000010000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1005.105062][T32720] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1005.115217][T32720] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1005.123062][T32660] loop3: detected capacity change from 0 to 264192 [ 1005.128342][T32654] loop5: detected capacity change from 0 to 69377 [ 1005.140556][T32619] loop1: detected capacity change from 0 to 90881 22:53:20 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x248}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1005.171930][T32660] loop3: p1 p3 p4 [ 1005.175840][T32660] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1005.181198][T32619] loop1: p1 p3 p4 [ 1005.185349][ T1439] loop5: p1 < > p3 p4 [ 1005.187068][T32619] loop1: p1 size 11290111 extends beyond EOD, [ 1005.190752][ T1439] loop5: partition table partially beyond EOD, truncated [ 1005.190865][ T1439] loop5: p1 start 1275068416 is beyond EOD, [ 1005.197020][T32619] truncated [ 1005.203974][ T1439] truncated [ 1005.217737][T32720] loop4: detected capacity change from 0 to 90881 [ 1005.222973][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1005.232357][T32660] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1005.232622][T32619] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1005.247085][T32720] loop4: p1 p3 p4 [ 1005.251036][T32720] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1005.260203][T32654] loop5: p1 < > p3 p4 [ 1005.260288][T32720] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1005.264371][T32654] loop5: partition table partially beyond EOD, truncated [ 1005.279541][T32654] loop5: p1 start 1275068416 is beyond EOD, truncated [ 1005.286926][T32654] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1005.295443][ T1439] loop5: p1 < > p3 p4 [ 1005.299504][ T1439] loop5: partition table partially beyond EOD, truncated [ 1005.306947][ T1439] loop5: p1 start 1275068416 is beyond EOD, truncated 22:53:20 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000068ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:20 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:20 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:20 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f54180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:20 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000006000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:20 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000000000204000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 1005.317816][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated 22:53:20 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:20 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x366}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1005.355475][ T686] loop3: detected capacity change from 0 to 264192 [ 1005.378061][ T727] loop1: detected capacity change from 0 to 90881 [ 1005.392191][ T686] loop3: p1 p3 p4 22:53:20 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000100000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1005.400843][ T732] loop4: detected capacity change from 0 to 90881 [ 1005.401099][ T686] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1005.415326][ T740] loop5: detected capacity change from 0 to 69377 [ 1005.415981][ T1439] loop1: p1 p3 p4 [ 1005.427705][ T732] loop4: p1 p3 p4 [ 1005.430263][ T686] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1005.432181][ T732] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1005.443910][ T1439] loop1: p1 size 11290111 extends beyond EOD, truncated 22:53:20 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1005.455962][ T732] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1005.465794][ T1439] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1005.473571][ T740] loop5: p1 < > p3 p4 [ 1005.477659][ T740] loop5: partition table partially beyond EOD, truncated [ 1005.485900][ T740] loop5: p1 start 1744830464 is beyond EOD, truncated [ 1005.486898][ T727] loop1: p1 p3 p4 [ 1005.495791][ T740] loop5: p4 size 3674243072 extends beyond EOD, truncated 22:53:20 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1005.509316][ T727] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1005.516947][ T686] loop3: detected capacity change from 0 to 264192 [ 1005.524452][ T732] loop4: detected capacity change from 0 to 90881 [ 1005.527635][ T727] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1005.554597][ T732] loop4: p1 p3 p4 22:53:20 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1005.559962][ T740] loop5: detected capacity change from 0 to 69377 [ 1005.567588][ T1439] loop3: p1 p3 p4 [ 1005.573752][ T732] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1005.576430][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1005.583186][ T732] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1005.595907][ T727] loop1: detected capacity change from 0 to 90881 [ 1005.605308][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1005.618388][ T740] loop5: p1 < > p3 p4 [ 1005.622511][ T740] loop5: partition table partially beyond EOD, truncated [ 1005.629657][ T740] loop5: p1 start 1744830464 is beyond EOD, truncated [ 1005.634060][ T1439] loop3: p1 p3 p4 [ 1005.637248][ T740] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1005.645539][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated 22:53:20 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a00006cff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:20 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:20 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000000000264000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:20 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f55180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 1005.654987][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1005.665822][ T727] loop1: p1 p3 p4 [ 1005.669760][ T727] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1005.678260][ T727] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1005.678487][ T686] loop3: p1 p3 p4 [ 1005.689239][ T686] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1005.696928][ T686] loop3: p4 size 3674243072 extends beyond EOD, truncated 22:53:20 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa90008000000002c6100024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:20 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:20 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:20 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1005.716107][ T1047] loop4: detected capacity change from 0 to 90881 [ 1005.752928][ T1163] loop5: detected capacity change from 0 to 69377 [ 1005.759929][ T1165] loop1: detected capacity change from 0 to 90881 [ 1005.768404][ T1047] loop4: p1 p3 p4 [ 1005.772837][ T1047] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1005.787770][ T1175] loop3: detected capacity change from 0 to 264192 [ 1005.795466][ T1047] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1005.804251][ T1439] loop5: p1 < > p3 p4 [ 1005.808367][ T1439] loop5: partition table partially beyond EOD, truncated 22:53:20 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1005.815922][ T1165] loop1: p1 p3 p4 [ 1005.816379][ T1439] loop5: p1 start 1811939328 is beyond EOD, truncated [ 1005.823576][ T1165] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1005.828678][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1005.835527][ T1175] loop3: p1 p3 p4 [ 1005.846530][ T1175] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1005.849402][ T1165] loop1: p4 size 3674243072 extends beyond EOD, truncated 22:53:20 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1005.866079][ T1175] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1005.873899][ T1439] loop5: p1 < > p3 p4 [ 1005.874019][ T1047] loop4: detected capacity change from 0 to 90881 [ 1005.877984][ T1439] loop5: partition table partially beyond EOD, truncated [ 1005.885456][ T1439] loop5: p1 start 1811939328 is beyond EOD, truncated [ 1005.898905][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1005.912490][ T1165] loop1: detected capacity change from 0 to 90881 [ 1005.920824][ T1163] loop5: p1 < > p3 p4 [ 1005.924972][ T1163] loop5: partition table partially beyond EOD, truncated [ 1005.927900][ T1047] loop4: p1 p3 p4 [ 1005.933428][ T1163] loop5: p1 start 1811939328 is beyond EOD, truncated [ 1005.937770][ T1047] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1005.944982][ T1163] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1005.955620][ T1175] loop3: detected capacity change from 0 to 264192 22:53:20 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:20 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1005.965442][ T1047] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1005.972841][ T1165] loop1: p1 p3 p4 [ 1005.977264][ T1165] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1005.987254][ T1165] loop1: p4 size 3674243072 extends beyond EOD, truncated 22:53:20 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000074ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:20 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000006300024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:20 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa90008000000000000002f4000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 1006.011842][ T1175] loop3: p1 p3 p4 [ 1006.016772][ T1163] loop5: detected capacity change from 0 to 69377 [ 1006.021904][ T1175] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1006.033129][ T1175] loop3: p4 size 3674243072 extends beyond EOD, truncated 22:53:20 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f60180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:20 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:20 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1006.068895][ T1506] loop4: detected capacity change from 0 to 90881 [ 1006.078886][ T1439] loop3: p1 p3 p4 [ 1006.083949][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1006.088613][ T1510] loop1: detected capacity change from 0 to 90881 [ 1006.099085][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1006.102213][ T1506] loop4: p1 p3 p4 [ 1006.108668][ T1541] loop5: detected capacity change from 0 to 69377 22:53:20 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1006.110976][ T1506] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1006.126831][ T1506] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1006.134366][ T1510] loop1: p1 p3 p4 [ 1006.138354][ T1510] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1006.147471][ T1510] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1006.162230][ T1541] loop5: p1 < > p3 p4 22:53:21 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:21 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1006.166245][ T1553] loop3: detected capacity change from 0 to 264192 [ 1006.166333][ T1541] loop5: partition table partially beyond EOD, truncated [ 1006.180055][ T1541] loop5: p1 start 1946157056 is beyond EOD, truncated [ 1006.190466][ T1541] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1006.198225][ T1506] loop4: detected capacity change from 0 to 90881 [ 1006.210086][ T1439] loop5: p1 < > p3 p4 [ 1006.210439][ T1510] loop1: detected capacity change from 0 to 90881 [ 1006.214220][ T1439] loop5: partition table partially beyond EOD, truncated [ 1006.214557][ T1439] loop5: p1 start 1946157056 is beyond EOD, truncated [ 1006.240836][ T1553] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1006.243445][ T1506] loop4: p1 p3 p4 [ 1006.247651][ T1439] loop5: p4 size 3674243072 extends beyond EOD, [ 1006.338650][ T1506] loop4: p1 size 11290111 extends beyond EOD, [ 1006.339211][ T1439] truncated [ 1006.347345][ T1553] loop3: p4 size 3674243072 extends beyond EOD, [ 1006.351831][ T1506] truncated [ 1006.354362][ T1510] loop1: p1 p3 p4 22:53:21 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:21 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1006.355018][ T1553] truncated [ 1006.371992][ T1510] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1006.383614][ T1506] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1006.391930][ T1510] loop1: p4 size 3674243072 extends beyond EOD, truncated 22:53:21 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000000000314000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 1006.417637][ T1541] loop5: detected capacity change from 0 to 69377 [ 1006.461724][ T1541] loop5: p1 < > p3 p4 [ 1006.465820][ T1541] loop5: partition table partially beyond EOD, truncated [ 1006.478578][ T1988] loop4: detected capacity change from 0 to 90881 [ 1006.486601][ T1541] loop5: p1 start 1946157056 is beyond EOD, truncated [ 1006.497302][ T1541] loop5: p4 size 3674243072 extends beyond EOD, truncated 22:53:21 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a00007aff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:21 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000006800024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:21 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1006.532011][ T1988] loop4: p1 p3 p4 [ 1006.536065][ T1988] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1006.544139][ T1988] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1006.556550][ T1991] loop1: detected capacity change from 0 to 90881 [ 1006.591516][ T2113] loop5: detected capacity change from 0 to 69377 [ 1006.601189][ T1988] loop4: detected capacity change from 0 to 90881 [ 1006.612499][ T1991] loop1: p1 p3 p4 [ 1006.616469][ T1991] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1006.621813][ T2113] loop5: p1 < > p3 p4 [ 1006.625068][ T1988] loop4: p1 p3 p4 [ 1006.627467][ T2113] loop5: partition table partially beyond EOD, truncated [ 1006.631556][ T1988] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1006.640277][ T1991] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1006.646123][ T2113] loop5: p1 start 2046820352 is beyond EOD, truncated [ 1006.656356][ T1988] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1006.668272][ T2113] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1006.713561][ T1991] loop1: detected capacity change from 0 to 90881 [ 1006.720801][ T1553] loop3: detected capacity change from 0 to 264192 [ 1006.732021][ T2113] loop5: detected capacity change from 0 to 69377 [ 1006.751851][ T2932] loop1: p1 p3 p4 [ 1006.755714][ T2932] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1006.758473][ T1553] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1006.763502][ T1439] loop5: p1 < > p3 p4 [ 1006.765123][ T1553] loop3: p4 size 3674243072 extends beyond EOD, [ 1006.850445][ T1439] loop5: partition table partially beyond EOD, truncated [ 1006.852175][ T1439] loop5: p1 start 2046820352 is beyond EOD, [ 1006.854648][ T1553] truncated [ 1006.860929][ T1439] truncated [ 1006.865263][ T2932] loop1: p4 size 3674243072 extends beyond EOD, [ 1006.871511][ T1439] loop5: p4 size 3674243072 extends beyond EOD, [ 1006.873930][ T2932] truncated [ 1006.876994][ T1439] truncated [ 1006.900619][ T1439] loop5: p1 < > p3 p4 [ 1006.904769][ T1439] loop5: partition table partially beyond EOD, truncated [ 1006.911595][ T1991] loop_reread_partitions: partition scan of loop1 () failed (rc=-16) [ 1006.912152][ T1439] loop5: p1 start 2046820352 is beyond EOD, truncated [ 1006.927625][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1006.936630][ T2113] loop5: p1 < > p3 p4 [ 1006.940747][ T2113] loop5: partition table partially beyond EOD, truncated [ 1006.949832][ T2113] loop5: p1 start 2046820352 is beyond EOD, truncated [ 1006.958487][ T2113] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1007.111083][ T1439] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1007.112195][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated 22:53:22 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f63180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:22 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:22 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:22 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa90008000000000000003f4000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:22 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000036a00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:22 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000090ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:22 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1007.319907][ T2119] loop4: detected capacity change from 0 to 90881 [ 1007.327016][ T2122] loop5: detected capacity change from 0 to 69377 [ 1007.335363][ T2124] loop1: detected capacity change from 0 to 90881 22:53:22 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1007.371832][ T2124] loop1: p1 p3 p4 [ 1007.377798][ T2122] loop5: p1 < > p3 p4 [ 1007.382001][ T2122] loop5: partition table partially beyond EOD, truncated [ 1007.390647][ T2119] loop4: p1 p3 p4 [ 1007.395147][ T2119] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1007.402460][ T2124] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1007.402989][ T2122] loop5: p1 start 2415919104 is beyond EOD, truncated 22:53:22 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:22 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1007.419800][ T2119] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1007.419888][ T2124] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1007.427923][ T2122] loop5: p4 size 3674243072 extends beyond EOD, truncated 22:53:22 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:22 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1007.500361][ T2122] loop5: detected capacity change from 0 to 69377 [ 1007.501912][ T2119] loop4: detected capacity change from 0 to 90881 [ 1007.516941][ T2124] loop1: detected capacity change from 0 to 90881 [ 1007.553917][ T2119] loop4: p1 p3 p4 [ 1007.557773][ T2124] loop1: p1 p3 p4 [ 1007.561702][ T2122] loop5: p1 < > p3 p4 [ 1007.565771][ T2122] loop5: partition table partially beyond EOD, truncated [ 1007.574651][ T2124] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1007.581853][ T2119] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1007.589416][ T2122] loop5: p1 start 2415919104 is beyond EOD, truncated [ 1007.598218][ T2124] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1007.608752][ T2119] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1007.621164][ T2122] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1007.684548][ T2580] loop3: detected capacity change from 0 to 196353 [ 1007.721787][ T1439] loop3: p1 p3 p4 [ 1007.725737][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1007.733603][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1007.743209][ T2580] loop3: p1 p3 p4 [ 1007.746991][ T2580] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1007.754777][ T2580] loop3: p4 size 3674243072 extends beyond EOD, truncated 22:53:22 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f68180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:22 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4802}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:22 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:22 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000006c00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:22 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000000000644000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:22 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a0000e1ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:22 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:22 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:22 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1007.831339][ T2583] loop4: detected capacity change from 0 to 90881 [ 1007.838637][ T2587] loop1: detected capacity change from 0 to 90881 [ 1007.840941][ T2592] loop5: detected capacity change from 0 to 69377 [ 1007.863900][ T2662] loop3: detected capacity change from 0 to 264192 [ 1007.902364][ T1439] loop5: p1 < > p3 p4 [ 1007.903330][ T1906] loop1: p1 p3 p4 [ 1007.906465][ T1439] loop5: partition table partially beyond EOD, truncated [ 1007.906586][ T2932] loop4: p1 p3 p4 [ 1007.910812][ T1906] loop1: p1 size 11290111 extends beyond EOD, [ 1007.917641][ T1439] loop5: p1 start 3774873600 is beyond EOD, [ 1007.920974][ T1906] truncated [ 1007.923388][ T2662] loop3: p1 p3 p4 [ 1007.927198][ T1439] truncated [ 1007.936370][ T2662] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1007.950815][ T2932] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1007.959763][ T1906] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1007.961390][ T2932] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1007.967165][ T2662] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1007.980278][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1007.984077][ T2583] loop_reread_partitions: partition scan of loop4 () failed (rc=-16) 22:53:22 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6603}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1008.007460][ T2587] loop1: p1 p3 p4 [ 1008.017839][ T2587] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1008.029095][ T2592] loop5: p1 < > p3 p4 [ 1008.030398][ T2587] loop1: p4 size 3674243072 extends beyond EOD, [ 1008.033256][ T2592] loop5: partition table partially beyond EOD, truncated [ 1008.039107][ T2592] loop5: p1 start 3774873600 is beyond EOD, [ 1008.039684][ T2587] truncated 22:53:22 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:22 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000007400024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 1008.055815][ T2592] truncated [ 1008.066833][ T2662] loop3: detected capacity change from 0 to 264192 [ 1008.074142][ T2592] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1008.094829][ T2583] loop4: detected capacity change from 0 to 90881 [ 1008.112144][ T1439] loop3: p1 p3 p4 [ 1008.116014][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1008.121742][ T3032] loop1: detected capacity change from 0 to 90881 [ 1008.126293][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1008.137083][ T2583] loop4: p1 p3 p4 [ 1008.141165][ T2583] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1008.150717][ T2583] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1008.152669][ T2592] loop5: detected capacity change from 0 to 69377 [ 1008.158346][ T2662] loop3: p1 p3 p4 [ 1008.168422][ T2662] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1008.175534][ T3032] loop1: p1 p3 p4 [ 1008.176469][ T2662] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1008.179588][ T3032] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1008.196278][ T3032] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1008.204509][ T1439] loop5: p1 < > p3 p4 22:53:23 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:23 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f6c180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:23 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000ffffffe44000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:23 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1008.208600][ T1439] loop5: partition table partially beyond EOD, truncated [ 1008.215810][ T1439] loop5: p1 start 3774873600 is beyond EOD, truncated [ 1008.223236][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1008.232133][ T2592] loop5: p1 < > p3 p4 [ 1008.236226][ T2592] loop5: partition table partially beyond EOD, truncated [ 1008.247431][ T2592] loop5: p1 start 3774873600 is beyond EOD, truncated 22:53:23 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1008.258332][ T3032] loop1: detected capacity change from 0 to 90881 [ 1008.259975][ T2592] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1008.268323][ T3042] loop4: detected capacity change from 0 to 90881 22:53:23 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a0021e1ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:23 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1008.304890][ T3032] loop1: p1 p3 p4 [ 1008.308773][ T3042] loop4: p1 p3 p4 [ 1008.313288][ T3032] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1008.320573][ T3042] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1008.332546][ T3032] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1008.345495][ T3042] loop4: p4 size 3674243072 extends beyond EOD, truncated 22:53:23 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:23 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000007a00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:23 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1008.349850][ T3158] loop3: detected capacity change from 0 to 257793 [ 1008.370632][ T3180] loop5: detected capacity change from 0 to 69377 [ 1008.393075][ T3158] loop3: p1 p3 p4 [ 1008.396909][ T3158] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1008.407844][ T1439] loop5: p1 < > p3 p4 [ 1008.410511][ T3158] loop3: p4 size 3674243072 extends beyond EOD, [ 1008.411941][ T1439] loop5: partition table partially beyond EOD, truncated [ 1008.412448][ T3042] loop4: detected capacity change from 0 to 90881 [ 1008.418292][ T3158] truncated [ 1008.428536][ T1439] loop5: p1 start 3777036288 is beyond EOD, truncated [ 1008.446098][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1008.451774][ T3042] loop4: p1 p3 p4 [ 1008.455282][ T3321] loop1: detected capacity change from 0 to 90881 [ 1008.457153][ T3042] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1008.472446][ T3180] loop5: p1 < > p3 p4 [ 1008.474200][ T3042] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1008.476666][ T3180] loop5: partition table partially beyond EOD, truncated [ 1008.491452][ T3180] loop5: p1 start 3777036288 is beyond EOD, truncated [ 1008.498857][ T3158] loop3: detected capacity change from 0 to 257793 22:53:23 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:23 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1200000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:23 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa90008000000007fffffff4000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 1008.505347][ T3180] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1008.522273][ T1439] loop5: p1 < > p3 p4 [ 1008.526356][ T1439] loop5: partition table partially beyond EOD, truncated [ 1008.538309][ T3321] loop1: p1 p3 p4 [ 1008.542483][ T3321] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1008.549834][ T3158] loop3: p1 p3 p4 [ 1008.549872][ T1439] loop5: p1 start 3777036288 is beyond EOD, truncated [ 1008.554010][ T3158] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1008.561512][ T3321] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1008.575237][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1008.578455][ T3158] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1008.592002][ T3443] loop4: detected capacity change from 0 to 90881 22:53:23 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f74180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:23 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xab00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:23 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2200000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1008.634960][ T3443] loop4: p1 p3 p4 [ 1008.638951][ T3443] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1008.643904][ T3180] loop5: detected capacity change from 0 to 69377 [ 1008.648344][ T3443] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1008.656320][ T3321] loop1: detected capacity change from 0 to 90881 [ 1008.662698][ T1439] loop3: p1 p3 p4 [ 1008.670402][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated 22:53:23 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2300000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:23 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000fffff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:23 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb601}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1008.679164][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1008.702224][ T3321] loop1: p1 p3 p4 [ 1008.707607][ T3321] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1008.715121][ T3443] loop4: detected capacity change from 0 to 90881 [ 1008.727275][ T3321] loop1: p4 size 3674243072 extends beyond EOD, truncated 22:53:23 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa900080000ffffff8000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:23 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:23 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2700000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1008.763588][ T3443] loop4: p1 p3 p4 [ 1008.767843][ T3687] loop5: detected capacity change from 0 to 69377 [ 1008.771792][ T3443] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1008.774901][ T3689] loop3: detected capacity change from 0 to 253697 [ 1008.787194][ T3443] loop4: p4 size 3674243072 extends beyond EOD, truncated 22:53:23 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:23 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000000000200000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:23 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1008.823364][ T1439] loop5: p1 < > p3 p4 [ 1008.827457][ T1439] loop5: partition table partially beyond EOD, truncated [ 1008.832079][ T3689] loop3: p1 p3 p4 [ 1008.843434][ T3796] loop1: detected capacity change from 0 to 90881 [ 1008.846289][ T1439] loop5: p1 start 4279173120 is beyond EOD, truncated [ 1008.850075][ T3689] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1008.865505][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1008.872638][ T3801] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1008.875981][ T3802] loop4: detected capacity change from 0 to 90881 [ 1008.886895][ T3689] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1008.903204][ T3796] loop1: p1 p3 p4 [ 1008.907124][ T3796] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1008.908678][ T1439] loop5: p1 < > p3 p4 [ 1008.915744][ T3796] loop1: p4 size 3674243072 extends beyond EOD, [ 1008.918164][ T1439] loop5: partition table partially beyond EOD, truncated [ 1008.919166][ T1439] loop5: p1 start 4279173120 is beyond EOD, [ 1008.924713][ T3796] truncated [ 1008.925086][ T3802] loop4: p1 p3 p4 [ 1008.931879][ T1439] truncated [ 1008.951056][ T3802] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1008.960102][ T3802] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1008.968688][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1008.979052][ T3689] loop3: detected capacity change from 0 to 253697 [ 1008.980294][ T3796] loop1: detected capacity change from 0 to 90881 [ 1008.995400][ T3687] loop5: p1 < > p3 p4 [ 1008.999496][ T3687] loop5: partition table partially beyond EOD, truncated [ 1009.006833][ T3687] loop5: p1 start 4279173120 is beyond EOD, truncated [ 1009.012963][ T3796] loop1: p1 p3 p4 [ 1009.014778][ T3687] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1009.018104][ T3796] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1009.024712][ T3689] loop3: p1 p3 p4 [ 1009.036012][ T3689] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1009.042634][ T3802] loop4: detected capacity change from 0 to 90881 [ 1009.043763][ T3796] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1009.051127][ T3689] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1009.066435][ T3687] loop5: detected capacity change from 0 to 69377 22:53:23 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f7a180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:23 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:23 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:23 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa900080000ffffff8100024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 1009.082694][ T2953] loop4: p1 p3 p4 [ 1009.087165][ T2953] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1009.095371][ T2953] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1009.104776][ T3905] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1009.116787][ T3802] loop_reread_partitions: partition scan of loop4 () failed (rc=-16) [ 1009.119715][ T3908] loop1: detected capacity change from 0 to 90881 [ 1009.133642][ T1439] loop5: p1 < > p3 p4 [ 1009.137738][ T1439] loop5: partition table partially beyond EOD, truncated [ 1009.146412][ T1439] loop5: p1 start 4279173120 is beyond EOD, truncated [ 1009.154595][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1009.164403][ T3920] loop3: detected capacity change from 0 to 118529 [ 1009.173860][ T3908] loop1: p1 p3 p4 [ 1009.178048][ T3908] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1009.183262][ T1439] loop5: p1 < > p3 p4 [ 1009.186988][ T3908] loop1: p4 size 3674243072 extends beyond EOD, [ 1009.189080][ T1439] loop5: partition table partially beyond EOD, truncated [ 1009.189436][ T1439] loop5: p1 start 4279173120 is beyond EOD, [ 1009.195450][ T3908] truncated [ 1009.211591][ T1439] truncated [ 1009.213731][ T3920] loop3: p1 p3 p4 [ 1009.218660][ T3920] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1009.218944][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated 22:53:24 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000002ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:24 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000000200024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:24 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:24 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1009.234625][ T3920] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1009.235512][ T3687] loop5: p1 < > p3 p4 [ 1009.245854][ T3687] loop5: partition table partially beyond EOD, truncated [ 1009.247829][ T3908] loop1: detected capacity change from 0 to 90881 [ 1009.253306][ T3687] loop5: p1 start 4279173120 is beyond EOD, truncated [ 1009.267009][ T3687] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1009.284408][ T4015] loop4: detected capacity change from 0 to 90881 [ 1009.293169][ T4016] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1009.310772][ T3908] loop1: p1 p3 p4 [ 1009.318877][ T3908] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1009.326689][ T4015] loop4: p1 p3 p4 22:53:24 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4802000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:24 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1009.328643][ T3920] loop3: detected capacity change from 0 to 118529 [ 1009.331002][ T4015] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1009.344373][ T3908] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1009.347919][ T4015] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1009.365763][ T3920] loop3: p1 p3 p4 [ 1009.365895][ T4101] loop5: detected capacity change from 0 to 69377 [ 1009.373267][ T3920] loop3: p1 size 11290111 extends beyond EOD, truncated 22:53:24 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000018200024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:24 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1009.388981][ T3920] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1009.396763][ T4126] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1009.420190][ T4015] loop4: detected capacity change from 0 to 90881 [ 1009.432853][ T4101] loop5: p1 < > p3 p4 22:53:24 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f89180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 1009.437003][ T4101] loop5: partition table partially beyond EOD, truncated [ 1009.446558][ T4101] loop5: p1 start 33554432 is beyond EOD, truncated [ 1009.453416][ T4015] loop4: p1 p3 p4 [ 1009.457412][ T1439] loop3: p1 p3 p4 [ 1009.460404][ T4015] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1009.463708][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1009.471096][ T4101] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1009.479554][ T4230] loop1: detected capacity change from 0 to 90881 22:53:24 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:24 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50ae1d0000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1009.494004][ T4015] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1009.500964][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1009.509279][ T4233] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1009.532380][ T4230] loop1: p1 p3 p4 22:53:24 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000000300024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 1009.538569][ T4230] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1009.538921][ T4101] loop5: detected capacity change from 0 to 69377 [ 1009.561275][ T4230] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1009.580793][ T4338] loop4: detected capacity change from 0 to 90881 [ 1009.587911][ T4339] loop3: detected capacity change from 0 to 44801 [ 1009.612203][ T4101] loop5: p1 < > p3 p4 [ 1009.616338][ T4101] loop5: partition table partially beyond EOD, truncated [ 1009.616744][ T4230] loop1: detected capacity change from 0 to 90881 [ 1009.624133][ T4101] loop5: p1 start 33554432 is beyond EOD, truncated [ 1009.631387][ T4339] loop3: p1 p3 p4 [ 1009.637272][ T4101] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1009.642057][ T4339] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1009.649656][ T4338] loop4: p1 p3 p4 [ 1009.656023][ T4339] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1009.659738][ T4338] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1009.669217][ T4230] loop1: p1 p3 p4 [ 1009.673976][ T1439] loop5: p1 < > p3 p4 [ 1009.676189][ T4230] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1009.680082][ T1439] loop5: partition table partially beyond EOD, truncated [ 1009.680398][ T1439] loop5: p1 start 33554432 is beyond EOD, [ 1009.688569][ T4230] loop1: p4 size 3674243072 extends beyond EOD, [ 1009.694471][ T1439] truncated 22:53:24 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000003ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:24 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:24 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5200000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1009.696999][ T4338] loop4: p4 size 3674243072 extends beyond EOD, [ 1009.700261][ T4230] truncated [ 1009.700908][ T1439] loop5: p4 size 3674243072 extends beyond EOD, [ 1009.706661][ T4338] truncated [ 1009.728706][ T1439] truncated [ 1009.741123][ T4342] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 22:53:24 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000000400024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:24 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:24 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa900080000ffffff8200024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 1009.758358][ T4339] loop3: detected capacity change from 0 to 44801 22:53:24 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1009.792217][ T4443] loop4: detected capacity change from 0 to 90881 [ 1009.811495][ T1439] loop5: p1 < > p3 p4 [ 1009.815694][ T1439] loop5: partition table partially beyond EOD, truncated [ 1009.818473][ T4339] loop3: p1 p3 p4 [ 1009.827129][ T4339] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1009.828285][ T4452] loop1: detected capacity change from 0 to 90881 [ 1009.835675][ T4443] loop4: p1 p3 p4 [ 1009.845663][ T4449] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1009.845982][ T1439] loop5: p1 start 33554432 is beyond EOD, truncated [ 1009.859249][ T4443] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1009.865348][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1009.873390][ T4339] loop3: p4 size 3674243072 extends beyond EOD, truncated 22:53:24 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:24 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010fea180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:24 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1009.888413][ T4443] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1009.891847][ T4452] loop1: p1 p3 p4 [ 1009.899664][ T4452] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1009.908105][ T4452] loop1: p4 size 3674243072 extends beyond EOD, truncated 22:53:24 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6f01000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1009.940033][ T4443] loop4: detected capacity change from 0 to 90881 [ 1009.941682][ T4498] loop5: detected capacity change from 0 to 69377 [ 1009.957977][ T4559] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1009.975138][ T4498] loop5: p1 < > p3 p4 [ 1009.979248][ T4498] loop5: partition table partially beyond EOD, truncated [ 1009.979379][ T4452] loop1: detected capacity change from 0 to 90881 [ 1009.986817][ T4443] loop4: p1 p3 p4 [ 1009.999280][ T4498] loop5: p1 start 50331648 is beyond EOD, truncated [ 1010.001008][ T4564] loop3: detected capacity change from 0 to 61185 [ 1010.006747][ T4443] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1010.020945][ T4498] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1010.025393][ T4443] loop4: p4 size 3674243072 extends beyond EOD, truncated 22:53:24 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1010.038178][ T1439] loop5: p1 < > p3 p4 [ 1010.042327][ T1439] loop5: partition table partially beyond EOD, truncated [ 1010.049684][ T4564] loop3: p1 p3 p4 [ 1010.053467][ T4452] loop1: p1 p3 p4 [ 1010.054949][ T1439] loop5: p1 start 50331648 is beyond EOD, truncated [ 1010.057301][ T4452] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1010.065543][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1010.078631][ T4564] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1010.087034][ T4452] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1010.094983][ T4564] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1010.134481][ T4498] loop5: detected capacity change from 0 to 69377 [ 1010.145473][ T4564] loop3: detected capacity change from 0 to 61185 [ 1010.171836][ T4498] loop5: p1 < > p3 p4 [ 1010.175974][ T4498] loop5: partition table partially beyond EOD, truncated [ 1010.183167][ T4498] loop5: p1 start 50331648 is beyond EOD, truncated [ 1010.190469][ T4498] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1010.192039][ T1439] loop3: p1 p3 p4 [ 1010.201508][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1010.209344][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1010.218289][ T1439] loop3: p1 p3 p4 [ 1010.222330][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated 22:53:25 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000004ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:25 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:25 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000000500024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:25 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:25 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa900080000ffffff8500024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 1010.230497][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1010.239366][ T4564] loop3: p1 p3 p4 [ 1010.243453][ T4564] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1010.253789][ T4672] loop4: detected capacity change from 0 to 90881 [ 1010.257180][ T4674] loop1: detected capacity change from 0 to 90881 [ 1010.261693][ T4564] loop3: p4 size 3674243072 extends beyond EOD, truncated 22:53:25 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010fec180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 1010.275493][ T4669] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1010.289525][ T4672] loop4: p1 p3 p4 [ 1010.297566][ T4676] loop5: detected capacity change from 0 to 69377 [ 1010.301916][ T4672] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1010.312658][ T4672] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1010.319886][ T4674] loop1: p1 p3 p4 [ 1010.325208][ T4674] loop1: p1 size 11290111 extends beyond EOD, truncated 22:53:25 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:25 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1010.331924][ T4676] loop5: p1 < > p3 p4 [ 1010.333233][ T4674] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1010.336251][ T4676] loop5: partition table partially beyond EOD, truncated [ 1010.351370][ T4676] loop5: p1 start 67108864 is beyond EOD, truncated [ 1010.371667][ T4676] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1010.379439][ T4781] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1010.395800][ T4672] loop4: detected capacity change from 0 to 90881 [ 1010.399931][ T4674] loop1: detected capacity change from 0 to 90881 [ 1010.409173][ T1439] loop5: p1 < > p3 p4 [ 1010.413397][ T1439] loop5: partition table partially beyond EOD, truncated [ 1010.418078][ T4790] loop3: detected capacity change from 0 to 192257 [ 1010.420904][ T1439] loop5: p1 start 67108864 is beyond EOD, truncated 22:53:25 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9e01000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:25 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1010.434043][ T4672] loop4: p1 p3 p4 [ 1010.435531][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1010.445129][ T4672] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1010.454860][ T4672] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1010.462386][ T4674] loop1: p1 p3 p4 [ 1010.466665][ T4674] loop1: p1 size 11290111 extends beyond EOD, truncated 22:53:25 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000008900024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:25 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb601000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1010.481121][ T4674] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1010.488773][ T4790] loop3: p1 p3 p4 [ 1010.492763][ T4790] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1010.501331][ T4790] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1010.521046][ T4676] loop5: detected capacity change from 0 to 69377 [ 1010.528368][ T4888] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1010.550134][ T4906] loop1: detected capacity change from 0 to 90881 [ 1010.567232][ T4676] loop5: p1 < > p3 p4 [ 1010.571339][ T4676] loop5: partition table partially beyond EOD, truncated [ 1010.579331][ T4790] loop3: detected capacity change from 0 to 192257 [ 1010.579630][ T4676] loop5: p1 start 67108864 is beyond EOD, truncated [ 1010.593053][ T4906] loop1: p1 p3 p4 [ 1010.593689][ T4676] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1010.596853][ T4906] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1010.612507][ T4906] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1010.612580][ T1439] loop5: p1 < > p3 p4 [ 1010.623876][ T1439] loop5: partition table partially beyond EOD, truncated 22:53:25 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000005ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:25 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000000600024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:25 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:25 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd100000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1010.631459][ T1439] loop5: p1 start 67108864 is beyond EOD, truncated [ 1010.638729][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1010.652111][ T1439] loop3: p1 p3 p4 [ 1010.656132][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1010.663587][ T4906] loop1: detected capacity change from 0 to 90881 [ 1010.664640][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1010.680960][ T4996] loop4: detected capacity change from 0 to 90881 [ 1010.683811][ T4790] loop3: p1 p3 p4 [ 1010.691250][ T4790] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1010.700013][ T4790] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1010.700025][ T4998] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1010.712560][ T4996] loop4: p1 p3 p4 [ 1010.723625][ T4906] loop1: p1 p3 p4 [ 1010.724241][ T5017] loop5: detected capacity change from 0 to 69377 22:53:25 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010ffe180005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 1010.727524][ T4906] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1010.743988][ T4906] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1010.745317][ T4996] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1010.759482][ T4996] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1010.777292][ T1439] loop3: p1 p3 p4 22:53:25 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:25 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:25 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000018c00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 1010.781275][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1010.794015][ T5017] loop5: p1 < > p3 p4 [ 1010.798100][ T5017] loop5: partition table partially beyond EOD, truncated [ 1010.808047][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1010.815522][ T4996] loop4: detected capacity change from 0 to 90881 [ 1010.816063][ T5106] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 22:53:25 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:25 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1010.834106][ T5017] loop5: p1 start 83886080 is beyond EOD, truncated [ 1010.834327][ T5108] loop1: detected capacity change from 0 to 90881 [ 1010.841405][ T5017] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1010.871760][ T5108] loop1: p1 p3 p4 [ 1010.875780][ T5108] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1010.886928][ T5211] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1010.888866][ T5108] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1010.906351][ T4996] loop4: p1 p3 p4 [ 1010.910386][ T4996] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1010.923987][ T5017] loop5: detected capacity change from 0 to 69377 [ 1010.928461][ T4996] loop4: p4 size 3674243072 extends beyond EOD, truncated 22:53:25 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:25 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1010.950177][ T5293] loop3: detected capacity change from 0 to 264192 [ 1010.973121][ T5108] loop1: detected capacity change from 0 to 90881 [ 1010.981359][ T5320] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1010.982178][ T5017] loop5: p1 < > p3 p4 [ 1010.997041][ T5017] loop5: partition table partially beyond EOD, truncated [ 1011.004608][ T5017] loop5: p1 start 83886080 is beyond EOD, truncated [ 1011.012099][ T5293] loop3: p1 p3 p4 [ 1011.016194][ T5293] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1011.019828][ T5017] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1011.032743][ T1439] loop5: p1 < > p3 p4 [ 1011.035452][ T5293] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1011.036837][ T1439] loop5: partition table partially beyond EOD, truncated 22:53:25 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000006ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:25 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000000700024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:25 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1011.037030][ T1439] loop5: p1 start 83886080 is beyond EOD, truncated [ 1011.058418][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1011.065208][ T5108] loop1: p1 p3 p4 [ 1011.069641][ T5108] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1011.083920][ T5424] loop4: detected capacity change from 0 to 90881 22:53:25 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1011.086053][ T5425] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1011.096954][ T5293] loop3: detected capacity change from 0 to 264192 [ 1011.105324][ T5108] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1011.147270][ T5293] loop3: p1 p3 p4 [ 1011.147310][ T5424] loop4: p1 p3 p4 [ 1011.151382][ T5293] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1011.154925][ T5424] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1011.167386][ T5293] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1011.172855][ T5424] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1011.184867][ T5530] loop5: detected capacity change from 0 to 69377 22:53:26 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f00290005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:26 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:26 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:26 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa900080000ffffff8c00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 1011.222078][ T5530] loop5: p1 < > p3 p4 [ 1011.226176][ T5530] loop5: partition table partially beyond EOD, truncated [ 1011.233385][ T5530] loop5: p1 start 100663296 is beyond EOD, truncated [ 1011.240419][ T5530] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1011.250302][ T1439] loop3: p1 p3 p4 [ 1011.255147][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1011.265490][ T5533] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1011.266083][ T5424] loop4: detected capacity change from 0 to 90881 [ 1011.282152][ T5535] loop1: detected capacity change from 0 to 90881 [ 1011.293577][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1011.303607][ T5530] loop5: detected capacity change from 0 to 69377 [ 1011.314048][ T5424] loop4: p1 p3 p4 [ 1011.314387][ T5535] loop1: p1 p3 p4 22:53:26 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) 22:53:26 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) [ 1011.318025][ T5424] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1011.323767][ T5535] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1011.333636][ T5424] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1011.346878][ T5530] loop5: p1 < > p3 p4 [ 1011.350975][ T5530] loop5: partition table partially beyond EOD, truncated [ 1011.358990][ T5535] loop1: p4 size 3674243072 extends beyond EOD, truncated 22:53:26 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x0) 22:53:26 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) 22:53:26 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000007ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:26 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000000800024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:26 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:26 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x0) [ 1011.368110][ T5530] loop5: p1 start 100663296 is beyond EOD, truncated [ 1011.378741][ T5530] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1011.392637][ T5647] loop3: detected capacity change from 0 to 264192 [ 1011.405934][ T1439] loop5: p1 < > p3 p4 [ 1011.410022][ T1439] loop5: partition table partially beyond EOD, truncated [ 1011.417403][ T1439] loop5: p1 start 100663296 is beyond EOD, truncated [ 1011.425931][ T5655] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1011.434286][ T5647] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1011.438225][ T1439] loop5: p4 size 3674243072 extends beyond EOD, [ 1011.439230][ T5535] loop1: detected capacity change from 0 to 90881 [ 1011.525160][ T1439] truncated [ 1011.528908][ T5647] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1011.558417][ T5711] loop4: detected capacity change from 0 to 90881 [ 1011.602677][ T5711] loop4: p1 p3 p4 [ 1011.607989][ T5711] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1011.608523][ T5759] loop5: detected capacity change from 0 to 69377 [ 1011.615797][ T5711] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1011.653270][ T5759] loop5: p1 < > p3 p4 [ 1011.657377][ T5759] loop5: partition table partially beyond EOD, truncated [ 1011.665980][ T5759] loop5: p1 start 117440512 is beyond EOD, truncated [ 1011.674078][ T5759] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1011.684997][ T5711] loop4: detected capacity change from 0 to 90881 [ 1011.722698][ T5711] loop4: p1 p3 p4 [ 1011.727701][ T5759] loop5: detected capacity change from 0 to 69377 [ 1011.727716][ T5711] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1011.743664][ T5711] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1011.763648][ T5759] loop5: p1 < > p3 p4 [ 1011.767746][ T5759] loop5: partition table partially beyond EOD, truncated [ 1011.775023][ T5759] loop5: p1 start 117440512 is beyond EOD, truncated [ 1011.786815][ T5759] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1011.795256][ T1439] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1011.796509][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated 22:53:26 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0fe80005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:26 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) 22:53:26 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000018e00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:26 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:26 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000000900024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:26 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000008ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:26 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x0) 22:53:26 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x0) [ 1012.126207][ T5765] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1012.129665][ T5768] loop1: detected capacity change from 0 to 90881 [ 1012.138511][ T5767] loop5: detected capacity change from 0 to 69377 [ 1012.152359][ T5769] loop4: detected capacity change from 0 to 90881 [ 1012.160508][ T5773] loop3: detected capacity change from 0 to 188161 [ 1012.171954][ T5768] loop1: p1 p3 p4 22:53:27 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:27 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) [ 1012.175891][ T5768] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1012.183021][ T1439] loop5: p1 < > p3 p4 [ 1012.187089][ T1439] loop5: partition table partially beyond EOD, truncated [ 1012.194271][ T5769] loop4: p1 p3 p4 [ 1012.199073][ T5769] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1012.205404][ T5880] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1012.209668][ T1439] loop5: p1 start 134217728 is beyond EOD, truncated 22:53:27 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x0) 22:53:27 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) [ 1012.220055][ T5773] loop3: p1 p3 p4 [ 1012.228264][ T5773] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1012.229022][ T5769] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1012.239255][ T5768] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1012.247894][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1012.253635][ T5773] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1012.266065][ T1439] loop5: p1 < > p3 p4 [ 1012.270182][ T1439] loop5: partition table partially beyond EOD, truncated [ 1012.277776][ T1439] loop5: p1 start 134217728 is beyond EOD, truncated [ 1012.285878][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1012.299530][ T5767] loop5: p1 < > p3 p4 [ 1012.303675][ T5767] loop5: partition table partially beyond EOD, truncated [ 1012.305877][ T5769] loop4: detected capacity change from 0 to 90881 [ 1012.310922][ T5767] loop5: p1 start 134217728 is beyond EOD, truncated [ 1012.328421][ T5773] loop3: detected capacity change from 0 to 188161 [ 1012.328790][ T5767] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1012.338968][ T5768] loop1: detected capacity change from 0 to 90881 [ 1012.371796][ T5769] loop4: p1 p3 p4 [ 1012.371851][ T1439] loop3: p1 p3 p4 [ 1012.375727][ T5769] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1012.379670][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1012.388386][ T5769] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1012.395458][ T5768] loop1: p1 p3 p4 [ 1012.401927][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1012.404569][ T5768] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1012.418579][ T5767] loop5: detected capacity change from 0 to 69377 [ 1012.420744][ T5768] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1012.427316][ T1439] loop3: p1 p3 p4 [ 1012.436081][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1012.444197][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1012.454231][ T5773] loop3: p1 p3 p4 [ 1012.458123][ T5773] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1012.466343][ T5773] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1012.481869][ T1439] loop5: p1 < > p3 p4 [ 1012.485940][ T1439] loop5: partition table partially beyond EOD, truncated [ 1012.493446][ T1439] loop5: p1 start 134217728 is beyond EOD, truncated [ 1012.500581][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1012.509125][ T5767] loop5: p1 < > p3 p4 [ 1012.513312][ T5767] loop5: partition table partially beyond EOD, truncated 22:53:27 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0ff40005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:27 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) 22:53:27 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:27 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000000a00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:27 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa900080000ffffff9700024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 1012.520491][ T5767] loop5: p1 start 134217728 is beyond EOD, truncated [ 1012.527976][ T5767] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1012.538013][ T5995] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1012.552570][ T5996] loop4: detected capacity change from 0 to 90881 [ 1012.557665][ T2931] udevd[2931]: inotify_add_watch(7, /dev/loop1p3, 10) failed: No such file or directory 22:53:27 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000009ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:27 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x0) [ 1012.560099][ T1906] udevd[1906]: inotify_add_watch(7, /dev/loop1p1, 10) failed: No such file or directory [ 1012.579593][ T1966] udevd[1966]: inotify_add_watch(7, /dev/loop1p4, 10) failed: No such file or directory [ 1012.580339][ T5998] loop1: detected capacity change from 0 to 90881 [ 1012.592548][ T6000] loop3: detected capacity change from 0 to 200449 [ 1012.604975][ T1439] loop5: p1 < > p3 p4 [ 1012.609326][ T1439] loop5: partition table partially beyond EOD, truncated [ 1012.614921][ T2932] loop4: p1 p3 p4 22:53:27 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x0) 22:53:27 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1012.620511][ T2932] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1012.622941][ T1439] loop5: p1 start 134217728 is beyond EOD, truncated [ 1012.629128][ T5998] loop1: p1 p3 p4 [ 1012.638864][ T5998] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1012.647520][ T2932] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1012.653542][ T6000] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1012.655848][ T5998] loop1: p4 size 3674243072 extends beyond EOD, [ 1012.666223][ T6106] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1012.744020][ T5998] truncated [ 1012.753991][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated 22:53:27 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x11, 0xffffffffffffffff, 0x0) 22:53:27 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x12, 0xffffffffffffffff, 0x0) 22:53:27 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1012.772511][ T6000] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1012.786935][ T5996] loop4: p1 p3 p4 [ 1012.791546][ T5996] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1012.800642][ T5996] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1012.822601][ T5998] loop1: detected capacity change from 0 to 90881 [ 1012.827310][ T6216] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1012.858971][ T6273] loop5: detected capacity change from 0 to 69377 [ 1012.861321][ T5996] loop4: detected capacity change from 0 to 90881 [ 1012.874945][ T5998] loop1: p1 p3 p4 [ 1012.879284][ T5998] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1012.887742][ T5998] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1012.922992][ T6273] loop5: p1 < > p3 p4 [ 1012.923140][ T5996] loop4: p1 p3 p4 [ 1012.927173][ T6273] loop5: partition table partially beyond EOD, truncated [ 1012.931187][ T5996] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1012.949377][ T6273] loop5: p1 start 150994944 is beyond EOD, truncated [ 1012.957169][ T5996] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1012.965694][ T6273] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1013.016623][ T6273] loop5: detected capacity change from 0 to 69377 [ 1013.051683][ T6273] loop5: p1 < > p3 p4 [ 1013.055781][ T6273] loop5: partition table partially beyond EOD, truncated [ 1013.064303][ T6273] loop5: p1 start 150994944 is beyond EOD, truncated [ 1013.068026][ T1439] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1013.072566][ T6273] loop5: p4 size 3674243072 extends beyond EOD, [ 1013.073275][ T1439] loop3: p4 size 3674243072 extends beyond EOD, [ 1013.159761][ T6273] truncated [ 1013.166055][ T1439] truncated 22:53:28 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f00100005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:28 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x22, 0xffffffffffffffff, 0x0) 22:53:28 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:28 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000059e00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:28 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000000b00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:28 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a00000aff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:28 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x23, 0xffffffffffffffff, 0x0) 22:53:28 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x27, 0xffffffffffffffff, 0x0) 22:53:28 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x48, 0xffffffffffffffff, 0x0) [ 1013.392840][ T6323] loop3: detected capacity change from 0 to 40705 [ 1013.399200][ T6327] loop5: detected capacity change from 0 to 69377 [ 1013.401198][ T6328] loop4: detected capacity change from 0 to 90881 [ 1013.411362][ T6331] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1013.414274][ T6326] loop1: detected capacity change from 0 to 90881 22:53:28 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:28 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x4c, 0xffffffffffffffff, 0x0) [ 1013.451826][ T6327] loop5: p1 < > p3 p4 [ 1013.455915][ T6327] loop5: partition table partially beyond EOD, truncated [ 1013.459499][ T1439] loop3: p1 p3 p4 [ 1013.467820][ T6328] loop4: p1 p3 p4 [ 1013.471638][ T6326] loop1: p1 p3 p4 [ 1013.472517][ T6327] loop5: p1 start 167772160 is beyond EOD, truncated [ 1013.479835][ T6326] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1013.486197][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated 22:53:28 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x52, 0xffffffffffffffff, 0x0) [ 1013.491738][ T6328] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1013.499275][ T6327] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1013.505692][ T6444] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1013.516187][ T6328] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1013.527788][ T6326] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1013.536279][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1013.550251][ T1439] loop3: p1 p3 p4 [ 1013.552581][ T6327] loop5: detected capacity change from 0 to 69377 [ 1013.555359][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1013.568683][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1013.578663][ T6327] loop5: p1 < > p3 p4 [ 1013.579243][ T6328] loop4: detected capacity change from 0 to 90881 [ 1013.582957][ T6327] loop5: partition table partially beyond EOD, truncated [ 1013.583631][ T6323] loop3: p1 p3 p4 [ 1013.590748][ T6326] loop1: detected capacity change from 0 to 90881 [ 1013.597946][ T6327] loop5: p1 start 167772160 is beyond EOD, [ 1013.600981][ T6323] loop3: p1 size 11290111 extends beyond EOD, [ 1013.606807][ T6327] truncated [ 1013.615239][ T6327] loop5: p4 size 3674243072 extends beyond EOD, [ 1013.619511][ T6323] truncated [ 1013.622529][ T6323] loop3: p4 size 3674243072 extends beyond EOD, [ 1013.622766][ T6327] truncated [ 1013.629012][ T6323] truncated [ 1013.645071][ T6328] loop4: p1 p3 p4 [ 1013.647829][ T6326] loop1: p1 p3 p4 [ 1013.648874][ T6328] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1013.659078][ T6326] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1013.662124][ T6328] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1013.667834][ T6326] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1013.685001][ T6323] loop3: detected capacity change from 0 to 40705 [ 1013.733015][ T1439] loop3: p1 p3 p4 [ 1013.736970][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1013.745114][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1013.753873][ T6323] loop3: p1 p3 p4 [ 1013.757680][ T6323] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1013.766160][ T6323] loop3: p4 size 3674243072 extends beyond EOD, truncated 22:53:28 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f00290005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:28 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x68, 0xffffffffffffffff, 0x0) 22:53:28 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xab}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:28 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a00000bff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:28 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa900080000ffffffa100024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:28 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000000c00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 1013.823545][ T1439] loop3: p1 p3 p4 [ 1013.833068][ T6553] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1013.838147][ T6556] loop5: detected capacity change from 0 to 69377 [ 1013.845525][ T6555] loop4: detected capacity change from 0 to 90881 [ 1013.852812][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1013.864184][ T6557] loop1: detected capacity change from 0 to 90881 22:53:28 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x6c, 0xffffffffffffffff, 0x0) 22:53:28 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x74, 0xffffffffffffffff, 0x0) 22:53:28 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1013.870532][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1013.892737][ T6556] loop5: p1 < > p3 p4 [ 1013.892990][ T2932] loop4: p1 p3 p4 [ 1013.896833][ T6556] loop5: partition table partially beyond EOD, truncated [ 1013.907459][ T2932] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1013.916575][ T6556] loop5: p1 start 184549376 is beyond EOD, truncated [ 1013.923595][ T1906] loop1: p1 p3 p4 [ 1013.925758][ T2932] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1013.927420][ T1906] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1013.943390][ T6555] loop4: p1 p3 p4 [ 1013.947511][ T6556] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1013.948720][ T6555] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1013.955746][ T6667] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 22:53:28 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x7a, 0xffffffffffffffff, 0x0) 22:53:28 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0xd1, 0xffffffffffffffff, 0x0) [ 1013.962171][ T6668] loop3: detected capacity change from 0 to 264192 [ 1013.981194][ T1906] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1013.984508][ T6555] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1014.000857][ T6557] loop1: p1 p3 p4 [ 1014.010250][ T6556] loop5: detected capacity change from 0 to 69377 [ 1014.017632][ T6557] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1014.026715][ T6557] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1014.034729][ T1439] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 22:53:28 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x248}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1014.039192][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1014.137071][ T6556] loop5: p1 < > p3 p4 [ 1014.141249][ T6556] loop5: partition table partially beyond EOD, truncated [ 1014.143327][ T6777] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1014.154777][ T6556] loop5: p1 start 184549376 is beyond EOD, truncated [ 1014.167937][ T6556] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1014.182956][ T6557] loop1: detected capacity change from 0 to 90881 [ 1014.211815][ T6557] loop1: p1 p3 p4 [ 1014.215774][ T6557] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1014.224769][ T6557] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1014.369139][ T6668] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1014.370136][ T6668] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1014.793218][ T6878] loop3: detected capacity change from 0 to 264192 [ 1014.838382][ T1439] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1014.839780][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1015.114580][ T1439] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1015.115479][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1015.387461][ T6878] loop3: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1015.388332][ T6878] loop3: p4 size 3674243072 extends beyond EOD, truncated 22:53:30 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f00e80f05000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:30 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x16f, 0xffffffffffffffff, 0x0) 22:53:30 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000000d00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:30 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:30 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a00000cff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:30 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa900080000ffffffa500024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:30 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x19e, 0xffffffffffffffff, 0x0) 22:53:30 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x1b6, 0xffffffffffffffff, 0x0) 22:53:30 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x203, 0xffffffffffffffff, 0x0) 22:53:30 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x248, 0xffffffffffffffff, 0x0) 22:53:30 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x366}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1015.609898][ T6881] loop5: detected capacity change from 0 to 69377 [ 1015.619253][ T6887] loop4: detected capacity change from 0 to 90881 [ 1015.622523][ T6889] loop1: detected capacity change from 0 to 90881 [ 1015.633245][ T6888] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1015.691859][ T6889] loop1: p1 p3 p4 [ 1015.695766][ T6889] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1015.696177][ T7002] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1015.704009][ T6881] loop5: p1 < > p3 p4 [ 1015.718471][ T6881] loop5: partition table partially beyond EOD, truncated [ 1015.719117][ T6887] loop4: p1 p3 p4 [ 1015.729545][ T6887] loop4: p1 size 11290111 extends beyond EOD, truncated 22:53:30 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x300, 0xffffffffffffffff, 0x0) [ 1015.737031][ T6881] loop5: p1 start 201326592 is beyond EOD, truncated [ 1015.745755][ T6889] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1015.754354][ T6887] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1015.762319][ T6881] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1015.796037][ T6889] loop1: detected capacity change from 0 to 90881 [ 1015.819166][ T6881] loop5: detected capacity change from 0 to 69377 [ 1015.819532][ T6887] loop4: detected capacity change from 0 to 90881 [ 1015.841789][ T6889] loop1: p1 p3 p4 [ 1015.845879][ T6889] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1015.853324][ T6881] loop5: p1 < > p3 p4 [ 1015.857472][ T6881] loop5: partition table partially beyond EOD, truncated [ 1015.864104][ T6889] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1015.864593][ T6887] loop4: p1 p3 p4 [ 1015.876977][ T6887] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1015.877824][ T6881] loop5: p1 start 201326592 is beyond EOD, truncated [ 1015.894076][ T6887] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1015.902006][ T6881] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1015.978730][ T7108] loop3: detected capacity change from 0 to 264192 [ 1016.001907][ T7108] loop3: p1 p3 p4 [ 1016.005845][ T7108] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1016.015116][ T7108] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1016.025054][ T1439] loop3: p1 p3 p4 [ 1016.028977][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1016.037054][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1016.083283][ T7108] loop3: detected capacity change from 0 to 264192 [ 1016.121817][ T1439] loop3: p1 p3 p4 [ 1016.125671][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated 22:53:30 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f00f40f05000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:30 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x302, 0xffffffffffffffff, 0x0) 22:53:30 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x500}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:30 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa900080000ffffffa600024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:30 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a00000dff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:30 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000000e00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 1016.133664][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1016.142432][ T7108] loop3: p1 p3 p4 [ 1016.146408][ T7108] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1016.154077][ T7108] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1016.172599][ T7113] loop4: detected capacity change from 0 to 90881 22:53:31 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x500, 0xffffffffffffffff, 0x0) 22:53:31 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x600, 0xffffffffffffffff, 0x0) 22:53:31 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x700, 0xffffffffffffffff, 0x0) 22:53:31 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x900, 0xffffffffffffffff, 0x0) [ 1016.174848][ T7115] loop1: detected capacity change from 0 to 90881 [ 1016.180959][ T7116] loop5: detected capacity change from 0 to 69377 [ 1016.193497][ T7119] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 22:53:31 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1016.233177][ T7115] loop1: p1 p3 p4 [ 1016.234443][ T7116] loop5: p1 < > p3 p4 [ 1016.237038][ T7115] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1016.240993][ T7116] loop5: partition table partially beyond EOD, truncated [ 1016.248008][ T7113] loop4: p1 p3 p4 [ 1016.263995][ T7233] loop3: detected capacity change from 0 to 264192 [ 1016.265209][ T7116] loop5: p1 start 218103808 is beyond EOD, truncated 22:53:31 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0xa00, 0xffffffffffffffff, 0x0) [ 1016.274427][ T7113] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1016.286733][ T7236] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1016.289493][ T7116] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1016.306978][ T7115] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1016.314504][ T7113] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1016.315875][ T7233] loop3: p1 p3 p4 [ 1016.325463][ T7233] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1016.326381][ T1439] loop5: p1 < > p3 p4 [ 1016.335812][ T7233] loop3: p4 size 3674243072 extends beyond EOD, [ 1016.336635][ T1439] loop5: partition table partially beyond EOD, truncated [ 1016.336821][ T1439] loop5: p1 start 218103808 is beyond EOD, [ 1016.343096][ T7233] truncated [ 1016.349985][ T1439] truncated [ 1016.351337][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1016.377630][ T7113] loop4: detected capacity change from 0 to 90881 [ 1016.379023][ T7115] loop1: detected capacity change from 0 to 90881 [ 1016.395530][ T7233] loop3: detected capacity change from 0 to 264192 [ 1016.431895][ T7115] loop1: p1 p3 p4 [ 1016.437815][ T7113] loop4: p1 p3 p4 [ 1016.442439][ T7115] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1016.443150][ T7113] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1016.449626][ T7233] loop3: p1 p3 p4 [ 1016.460515][ T7233] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1016.461049][ T7113] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1016.468976][ T7115] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1016.476483][ T7233] loop3: p4 size 3674243072 extends beyond EOD, truncated 22:53:31 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f00180003000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:31 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0xb00, 0xffffffffffffffff, 0x0) 22:53:31 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:31 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a00000eff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:31 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa900080000ffffffa900024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:31 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000000f00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:31 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0xc00, 0xffffffffffffffff, 0x0) [ 1016.537564][ T1439] loop3: p1 p3 p4 [ 1016.541381][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1016.555645][ T7344] loop5: detected capacity change from 0 to 69377 [ 1016.563027][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1016.567207][ T7345] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 22:53:31 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0xd00, 0xffffffffffffffff, 0x0) 22:53:31 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0xe00, 0xffffffffffffffff, 0x0) 22:53:31 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x1100, 0xffffffffffffffff, 0x0) 22:53:31 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x1200, 0xffffffffffffffff, 0x0) [ 1016.588340][ T7351] loop1: detected capacity change from 0 to 90881 [ 1016.602049][ T1439] loop5: p1 < > p3 p4 [ 1016.606180][ T1439] loop5: partition table partially beyond EOD, truncated [ 1016.615179][ T7349] loop3: detected capacity change from 0 to 40705 [ 1016.620187][ T1439] loop5: p1 start 234881024 is beyond EOD, truncated [ 1016.629201][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated 22:53:31 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x2000, 0xffffffffffffffff, 0x0) [ 1016.639417][ T1439] loop5: p1 < > p3 p4 [ 1016.643646][ T1439] loop5: partition table partially beyond EOD, truncated [ 1016.653366][ T7349] loop3: p1 p3 p4 [ 1016.657235][ T7349] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1016.662311][ T1439] loop5: p1 start 234881024 is beyond EOD, truncated [ 1016.673583][ T7351] loop1: p1 p3 p4 [ 1016.677116][ T7469] loop4: detected capacity change from 0 to 90881 [ 1016.677572][ T7351] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1016.683983][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1016.691439][ T7349] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1016.700234][ T7351] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1016.714016][ T7344] loop5: p1 < > p3 p4 [ 1016.718087][ T7344] loop5: partition table partially beyond EOD, truncated [ 1016.725336][ T7344] loop5: p1 start 234881024 is beyond EOD, truncated [ 1016.726440][ T7469] loop4: p1 p3 p4 22:53:31 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018ea03000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:31 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x900}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:31 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x2200, 0xffffffffffffffff, 0x0) [ 1016.732883][ T7344] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1016.735889][ T7469] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1016.752521][ T7469] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1016.764940][ T1439] loop3: p1 p3 p4 [ 1016.768805][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1016.777520][ T7351] loop1: detected capacity change from 0 to 90881 [ 1016.777794][ T7474] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1016.791859][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1016.816291][ T7344] loop5: detected capacity change from 0 to 69377 [ 1016.824006][ T7469] loop4: detected capacity change from 0 to 90881 [ 1016.842882][ T7351] loop1: p1 p3 p4 [ 1016.845933][ T7522] loop3: detected capacity change from 0 to 89857 [ 1016.846920][ T7351] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1016.853847][ T1439] loop5: p1 < > p3 p4 [ 1016.860999][ T7469] loop4: p1 p3 p4 [ 1016.864212][ T1439] loop5: partition table partially beyond EOD, truncated [ 1016.865124][ T1439] loop5: p1 start 234881024 is beyond EOD, [ 1016.868869][ T7469] loop4: p1 size 11290111 extends beyond EOD, [ 1016.875024][ T1439] truncated [ 1016.880882][ T7469] truncated [ 1016.882822][ T7351] loop1: p4 size 3674243072 extends beyond EOD, [ 1016.888884][ T7469] loop4: p4 size 3674243072 extends beyond EOD, [ 1016.890120][ T7351] truncated [ 1016.890510][ T1439] loop5: p4 size 3674243072 extends beyond EOD, [ 1016.893277][ T7469] truncated [ 1016.899572][ T1439] truncated [ 1016.906128][ T7522] loop3: p1 p3 p4 [ 1016.925752][ T7522] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1016.926606][ T7344] loop5: p1 < > p3 p4 [ 1016.933592][ T7522] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1016.936841][ T7344] loop5: partition table partially beyond EOD, truncated [ 1016.938231][ T7344] loop5: p1 start 234881024 is beyond EOD, truncated [ 1016.958345][ T7344] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1016.979067][ T7522] loop3: detected capacity change from 0 to 89857 22:53:31 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a00000fff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:31 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x2300, 0xffffffffffffffff, 0x0) 22:53:31 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:31 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000001000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:31 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa900080000000002aa00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:31 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x2700, 0xffffffffffffffff, 0x0) [ 1017.004993][ T1439] loop5: p1 < > p3 p4 [ 1017.009116][ T1439] loop5: partition table partially beyond EOD, truncated [ 1017.012962][ T7579] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1017.020380][ T7582] loop4: detected capacity change from 0 to 90881 [ 1017.032512][ T7585] loop1: detected capacity change from 0 to 90881 [ 1017.035658][ T7522] loop3: p1 p3 p4 [ 1017.046482][ T1439] loop5: p1 start 234881024 is beyond EOD, truncated 22:53:31 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x3f00, 0xffffffffffffffff, 0x0) 22:53:31 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x4000, 0xffffffffffffffff, 0x0) 22:53:31 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x4800, 0xffffffffffffffff, 0x0) [ 1017.047873][ T7522] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1017.063804][ T7522] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1017.070619][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1017.079200][ T7585] loop1: p1 p3 p4 [ 1017.084821][ T7585] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1017.095283][ T7585] loop1: p4 size 3674243072 extends beyond EOD, truncated 22:53:31 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018f603000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:31 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:31 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x4802, 0xffffffffffffffff, 0x0) [ 1017.108991][ T7582] loop4: p1 p3 p4 [ 1017.117713][ T7582] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1017.125307][ T7702] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1017.129935][ T7582] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1017.159117][ T7585] loop1: detected capacity change from 0 to 90881 [ 1017.161375][ T7783] loop5: detected capacity change from 0 to 69377 [ 1017.166430][ T7785] loop3: detected capacity change from 0 to 65281 [ 1017.187144][ T7582] loop4: detected capacity change from 0 to 90881 [ 1017.222238][ T1439] loop3: p1 p3 p4 [ 1017.222804][ T2932] loop1: p1 p3 p4 [ 1017.226079][ T7783] loop5: p1 < > p3 p4 [ 1017.229858][ T2932] loop1: p1 size 11290111 extends beyond EOD, [ 1017.233809][ T7783] loop5: partition table partially beyond EOD, truncated [ 1017.239983][ T2932] truncated [ 1017.240222][ T7582] loop4: p1 p3 p4 [ 1017.247575][ T1439] loop3: p1 size 11290111 extends beyond EOD, [ 1017.252254][ T2932] loop1: p4 size 3674243072 extends beyond EOD, [ 1017.253912][ T1439] truncated [ 1017.254606][ T7783] loop5: p1 start 251658240 is beyond EOD, [ 1017.260051][ T2932] truncated [ 1017.267327][ T7582] loop4: p1 size 11290111 extends beyond EOD, [ 1017.269511][ T7783] truncated [ 1017.277202][ T1439] loop3: p4 size 3674243072 extends beyond EOD, [ 1017.278687][ T7582] truncated [ 1017.280725][ T7582] loop4: p4 size 3674243072 extends beyond EOD, [ 1017.284883][ T1439] truncated [ 1017.285568][ T7783] loop5: p4 size 3674243072 extends beyond EOD, [ 1017.287977][ T7582] truncated [ 1017.289975][ T7585] loop1: p1 p3 p4 [ 1017.294332][ T7783] truncated [ 1017.323211][ T7585] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1017.324536][ T1439] loop3: p1 p3 p4 [ 1017.330999][ T7585] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1017.335562][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1017.348967][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1017.359569][ T7785] loop3: p1 p3 p4 [ 1017.362731][ T7783] loop5: detected capacity change from 0 to 69377 [ 1017.363525][ T7785] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1017.378379][ T7785] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1017.392809][ T7783] loop5: p1 < > p3 p4 [ 1017.396884][ T7783] loop5: partition table partially beyond EOD, truncated [ 1017.404062][ T7783] loop5: p1 start 251658240 is beyond EOD, truncated [ 1017.411206][ T7783] loop5: p4 size 3674243072 extends beyond EOD, truncated 22:53:32 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000010ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:32 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x4c00, 0xffffffffffffffff, 0x0) 22:53:32 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:32 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000001100024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:32 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa900080000000003b100024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 1017.425866][ T7785] loop3: detected capacity change from 0 to 65281 [ 1017.442892][ T1439] loop5: p1 < > p3 p4 [ 1017.446981][ T1439] loop5: partition table partially beyond EOD, truncated [ 1017.457701][ T7810] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1017.459911][ T7812] loop4: detected capacity change from 0 to 90881 22:53:32 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x5200, 0xffffffffffffffff, 0x0) 22:53:32 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x6800, 0xffffffffffffffff, 0x0) 22:53:32 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x6c00, 0xffffffffffffffff, 0x0) [ 1017.470863][ T1439] loop5: p1 start 251658240 is beyond EOD, truncated [ 1017.476392][ T7813] loop1: detected capacity change from 0 to 90881 [ 1017.483988][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1017.493963][ T7785] loop3: p1 p3 p4 [ 1017.500298][ T7785] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1017.508533][ T7785] loop3: p4 size 3674243072 extends beyond EOD, truncated 22:53:32 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x6f01, 0xffffffffffffffff, 0x0) 22:53:32 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f00180205000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:32 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1017.531845][ T7812] loop4: p1 p3 p4 [ 1017.535649][ T7813] loop1: p1 p3 p4 [ 1017.539517][ T7813] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1017.539820][ T7812] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1017.549100][ T7813] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1017.571304][ T7812] loop4: p4 size 3674243072 extends beyond EOD, truncated 22:53:32 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x7400, 0xffffffffffffffff, 0x0) [ 1017.573032][ T7926] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1017.593890][ T7931] loop5: detected capacity change from 0 to 69377 [ 1017.596317][ T7813] loop1: detected capacity change from 0 to 90881 [ 1017.613916][ T7812] loop4: detected capacity change from 0 to 90881 [ 1017.624851][ T7992] loop3: detected capacity change from 0 to 44801 [ 1017.632689][ T1439] loop5: p1 < > p3 p4 [ 1017.636764][ T1439] loop5: partition table partially beyond EOD, truncated [ 1017.644271][ T1439] loop5: p1 start 268435456 is beyond EOD, truncated [ 1017.652787][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1017.654378][ T7812] loop4: p1 p3 p4 [ 1017.663738][ T7992] loop3: p1 p3 p4 [ 1017.664250][ T7812] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1017.667541][ T7992] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1017.675759][ T7812] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1017.681510][ T7813] loop1: p1 p3 p4 [ 1017.691689][ T7992] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1017.692613][ T7813] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1017.702211][ T7931] loop5: p1 < > p3 p4 [ 1017.708186][ T7813] loop1: p4 size 3674243072 extends beyond EOD, [ 1017.710639][ T7931] loop5: partition table partially beyond EOD, truncated [ 1017.710723][ T7931] loop5: p1 start 268435456 is beyond EOD, [ 1017.717015][ T7813] truncated [ 1017.732994][ T7931] truncated [ 1017.736660][ T7931] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1017.760910][ T7992] loop3: detected capacity change from 0 to 44801 [ 1017.787959][ T7931] loop5: detected capacity change from 0 to 69377 [ 1017.811901][ T1439] loop3: p1 p3 p4 [ 1017.815751][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1017.823926][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1017.832816][ T1439] loop3: p1 p3 p4 [ 1017.836619][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1017.844361][ T7931] loop5: p1 < > p3 p4 [ 1017.845778][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1017.848487][ T7931] loop5: partition table partially beyond EOD, truncated [ 1017.863114][ T7931] loop5: p1 start 268435456 is beyond EOD, truncated [ 1017.864604][ T7992] loop3: p1 p3 p4 [ 1017.870288][ T7931] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1017.875504][ T7992] loop3: p1 size 11290111 extends beyond EOD, truncated 22:53:32 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000011ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:32 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x7a00, 0xffffffffffffffff, 0x0) 22:53:32 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:32 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000001200024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:32 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa900080000ffffffbf00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 1017.888373][ T7992] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1017.913878][ T1439] loop5: p1 < > p3 p4 [ 1017.917957][ T1439] loop5: partition table partially beyond EOD, truncated [ 1017.921424][ T8039] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 22:53:32 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f00180305000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:32 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x9e01, 0xffffffffffffffff, 0x0) 22:53:32 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0xb601, 0xffffffffffffffff, 0x0) [ 1017.930326][ T8042] loop4: detected capacity change from 0 to 90881 [ 1017.938563][ T8043] loop1: detected capacity change from 0 to 90881 [ 1017.949717][ T1439] loop5: p1 start 268435456 is beyond EOD, truncated [ 1017.960882][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1017.976013][ T8043] loop1: p1 p3 p4 [ 1017.977617][ T8098] loop3: detected capacity change from 0 to 264192 22:53:32 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0xd100, 0xffffffffffffffff, 0x0) 22:53:32 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000012ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:32 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x100000, 0xffffffffffffffff, 0x0) 22:53:32 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x1dae50, 0xffffffffffffffff, 0x0) 22:53:32 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1017.980038][ T8043] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1017.994580][ T8042] loop4: p1 p3 p4 [ 1017.998414][ T8042] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1018.010122][ T8042] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1018.017920][ T8043] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1018.032285][ T8098] loop3: p1 p3 p4 22:53:32 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x200000, 0xffffffffffffffff, 0x0) 22:53:32 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x400000, 0xffffffffffffffff, 0x0) [ 1018.036522][ T8098] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1018.038194][ T8163] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1018.059652][ T8168] loop5: detected capacity change from 0 to 69377 [ 1018.064931][ T8098] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1018.076402][ T8042] loop4: detected capacity change from 0 to 90881 [ 1018.086522][ T8043] loop1: detected capacity change from 0 to 90881 [ 1018.093211][ T1439] loop3: p1 p3 p4 [ 1018.097258][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1018.105697][ T8042] loop4: p1 p3 p4 [ 1018.106104][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1018.109645][ T8168] loop5: p1 < > p3 p4 [ 1018.120702][ T8168] loop5: partition table partially beyond EOD, truncated [ 1018.126480][ T8042] loop4: p1 size 11290111 extends beyond EOD, truncated 22:53:33 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000001c00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 1018.136197][ T8042] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1018.140563][ T8168] loop5: p1 start 301989888 is beyond EOD, truncated [ 1018.143418][ T8043] loop1: p1 p3 p4 [ 1018.154604][ T8043] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1018.155127][ T8168] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1018.162846][ T8043] loop1: p4 size 3674243072 extends beyond EOD, truncated 22:53:33 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa900080000000001c200024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 1018.190515][ T8098] loop3: detected capacity change from 0 to 264192 [ 1018.194374][ T8168] loop5: detected capacity change from 0 to 69377 [ 1018.221932][ T8098] loop3: p1 p3 p4 [ 1018.222281][ T1439] loop5: p1 < > p3 p4 [ 1018.225851][ T8098] loop3: p1 size 11290111 extends beyond EOD, [ 1018.229731][ T1439] loop5: partition table partially beyond EOD, truncated [ 1018.230188][ T1439] loop5: p1 start 301989888 is beyond EOD, [ 1018.235931][ T8098] truncated [ 1018.242934][ T1439] truncated [ 1018.248475][ T1439] loop5: p4 size 3674243072 extends beyond EOD, [ 1018.250873][ T8278] loop4: detected capacity change from 0 to 90881 [ 1018.252008][ T1439] truncated [ 1018.258580][ T8276] loop1: detected capacity change from 0 to 90881 [ 1018.262753][ T8098] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1018.285769][ T1439] loop5: p1 < > p3 p4 [ 1018.289893][ T1439] loop5: partition table partially beyond EOD, truncated [ 1018.291829][ T8278] loop4: p1 p3 p4 [ 1018.297042][ T1439] loop5: p1 start 301989888 is beyond EOD, truncated [ 1018.301031][ T8276] loop1: p1 p3 p4 [ 1018.308203][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1018.312525][ T8278] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1018.318571][ T8276] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1018.328913][ T8278] loop4: p4 size 3674243072 extends beyond EOD, truncated 22:53:33 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f00180405000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:33 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x400001, 0xffffffffffffffff, 0x0) 22:53:33 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:33 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x80ffff, 0xffffffffffffffff, 0x0) [ 1018.337652][ T8276] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1018.340464][ T8168] loop5: p1 < > p3 p4 [ 1018.350869][ T8168] loop5: partition table partially beyond EOD, truncated [ 1018.359514][ T8168] loop5: p1 start 301989888 is beyond EOD, truncated [ 1018.360072][ T8281] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1018.368663][ T8168] loop5: p4 size 3674243072 extends beyond EOD, truncated 22:53:33 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000025ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:33 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x1000000, 0xffffffffffffffff, 0x0) 22:53:33 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1018.396938][ T8289] loop3: detected capacity change from 0 to 40705 [ 1018.406163][ T8278] loop4: detected capacity change from 0 to 90881 [ 1018.412793][ T8276] loop1: detected capacity change from 0 to 90881 [ 1018.434230][ T8289] loop3: p1 p3 p4 [ 1018.438484][ T8289] loop3: p1 size 11290111 extends beyond EOD, truncated 22:53:33 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x1004000, 0xffffffffffffffff, 0x0) [ 1018.443568][ T1439] loop5: p1 < > p3 p4 [ 1018.450347][ T1439] loop5: partition table partially beyond EOD, truncated [ 1018.453848][ T8289] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1018.464596][ T8276] loop1: p1 p3 p4 [ 1018.466217][ T1439] loop5: p1 start 301989888 is beyond EOD, truncated [ 1018.468676][ T8278] loop4: p1 p3 p4 [ 1018.477811][ T8393] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1018.480229][ T8276] loop1: p1 size 11290111 extends beyond EOD, truncated 22:53:33 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x2000000, 0xffffffffffffffff, 0x0) 22:53:33 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x2030000, 0xffffffffffffffff, 0x0) [ 1018.490735][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1018.501461][ T8278] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1018.517016][ T8276] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1018.525693][ T8278] loop4: p4 size 3674243072 extends beyond EOD, truncated 22:53:33 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000002500024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:33 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x3000000, 0xffffffffffffffff, 0x0) [ 1018.560063][ T8424] loop5: detected capacity change from 0 to 69377 [ 1018.563603][ T8289] loop3: detected capacity change from 0 to 40705 [ 1018.631939][ T8289] loop3: p1 p3 p4 [ 1018.633082][ T1439] loop5: p1 < > p3 p4 [ 1018.635984][ T8289] loop3: p1 size 11290111 extends beyond EOD, [ 1018.639737][ T1439] loop5: partition table partially beyond EOD, truncated [ 1018.640569][ T1439] loop5: p1 start 620756992 is beyond EOD, [ 1018.646251][ T8289] truncated [ 1018.647608][ T8289] loop3: p4 size 3674243072 extends beyond EOD, [ 1018.653284][ T1439] truncated [ 1018.658701][ T1439] loop5: p4 size 3674243072 extends beyond EOD, [ 1018.659165][ T8289] truncated 22:53:33 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f00180505000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:33 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2700}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:33 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa900080000000005c400024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:33 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x4000000, 0xffffffffffffffff, 0x0) [ 1018.663019][ T8509] loop4: detected capacity change from 0 to 90881 [ 1018.668626][ T1439] truncated [ 1018.692970][ T8424] loop5: p1 < > p3 p4 [ 1018.697044][ T8424] loop5: partition table partially beyond EOD, truncated [ 1018.704254][ T8424] loop5: p1 start 620756992 is beyond EOD, truncated [ 1018.713607][ T8513] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1018.715172][ T8514] loop1: detected capacity change from 0 to 90881 [ 1018.727112][ T8509] loop4: p1 p3 p4 [ 1018.735570][ T8424] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1018.736889][ T8509] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1018.751330][ T8509] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1018.765952][ T8603] loop3: detected capacity change from 0 to 264192 [ 1018.773415][ T8514] loop1: p1 p3 p4 [ 1018.777291][ T8514] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1018.785260][ T8514] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1018.794188][ T8603] loop3: p1 p3 p4 [ 1018.796151][ T8424] loop5: detected capacity change from 0 to 69377 [ 1018.798065][ T8603] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1018.813389][ T8509] loop4: detected capacity change from 0 to 90881 [ 1018.814699][ T8603] loop3: p4 size 3674243072 extends beyond EOD, truncated 22:53:33 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000048ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:33 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x5000000, 0xffffffffffffffff, 0x0) 22:53:33 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:33 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x6000000, 0xffffffffffffffff, 0x0) [ 1018.829591][ T1439] loop3: p1 p3 p4 [ 1018.833527][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1018.841477][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1018.843299][ T8509] loop4: p1 p3 p4 [ 1018.854483][ T8509] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1018.863026][ T8514] loop1: detected capacity change from 0 to 90881 [ 1018.864597][ T8509] loop4: p4 size 3674243072 extends beyond EOD, truncated 22:53:33 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x7000000, 0xffffffffffffffff, 0x0) 22:53:33 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x8000000, 0xffffffffffffffff, 0x0) 22:53:33 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000002600024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:33 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1018.878737][ T8623] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1018.896690][ T8632] loop5: detected capacity change from 0 to 69377 [ 1018.915202][ T8603] loop3: detected capacity change from 0 to 264192 [ 1018.921912][ T1906] loop1: p1 p3 p4 [ 1018.925762][ T1906] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1018.943277][ T8632] loop5: p1 < > p3 p4 [ 1018.944268][ T1906] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1018.947381][ T8632] loop5: partition table partially beyond EOD, truncated [ 1018.963445][ T8632] loop5: p1 start 1207959552 is beyond EOD, truncated [ 1018.965103][ T8514] loop1: p1 p3 p4 [ 1018.973560][ T8738] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1018.975559][ T8514] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1018.985998][ T8632] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1018.996613][ T8736] loop4: detected capacity change from 0 to 90881 [ 1019.002901][ T8514] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1019.007758][ T1439] loop3: p1 p3 p4 [ 1019.024718][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1019.033913][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1019.044261][ T1439] loop3: p1 p3 p4 [ 1019.048677][ T8632] loop5: detected capacity change from 0 to 69377 [ 1019.051329][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1019.062524][ T8736] loop4: p1 p3 p4 [ 1019.064576][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1019.066368][ T8736] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1019.081688][ T8632] loop5: p1 < > p3 p4 [ 1019.082486][ T8603] loop3: p1 p3 p4 [ 1019.085757][ T8632] loop5: partition table partially beyond EOD, truncated [ 1019.085855][ T8632] loop5: p1 start 1207959552 is beyond EOD, [ 1019.089813][ T8603] loop3: p1 size 11290111 extends beyond EOD, [ 1019.096637][ T8632] truncated [ 1019.099383][ T8736] loop4: p4 size 3674243072 extends beyond EOD, [ 1019.102763][ T8603] truncated [ 1019.104934][ T8603] loop3: p4 size 3674243072 extends beyond EOD, [ 1019.108922][ T8736] truncated [ 1019.112056][ T8603] truncated [ 1019.117746][ T8632] loop5: p4 size 3674243072 extends beyond EOD, truncated 22:53:34 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa900080000ffffffc900024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:34 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x9000000, 0xffffffffffffffff, 0x0) 22:53:34 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f00180605000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:34 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a00004cff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:34 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4802}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1019.143643][ T1439] loop5: p1 < > p3 p4 [ 1019.147705][ T1439] loop5: partition table partially beyond EOD, truncated [ 1019.155007][ T1439] loop5: p1 start 1207959552 is beyond EOD, truncated [ 1019.162522][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated 22:53:34 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0xa000000, 0xffffffffffffffff, 0x0) 22:53:34 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0xb000000, 0xffffffffffffffff, 0x0) 22:53:34 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0xc000000, 0xffffffffffffffff, 0x0) [ 1019.189736][ T8842] loop1: detected capacity change from 0 to 90881 [ 1019.194434][ T8736] loop4: detected capacity change from 0 to 90881 [ 1019.204316][ T8845] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1019.232838][ T8736] loop4: p1 p3 p4 22:53:34 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0xd000000, 0xffffffffffffffff, 0x0) 22:53:34 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1019.236700][ T8736] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1019.242608][ T8842] loop1: p1 p3 p4 [ 1019.250970][ T8842] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1019.257924][ T8736] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1019.264585][ T8956] loop5: detected capacity change from 0 to 69377 [ 1019.272281][ T8960] loop3: detected capacity change from 0 to 36609 [ 1019.274192][ T8842] loop1: p4 size 3674243072 extends beyond EOD, truncated 22:53:34 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000002e00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:34 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0xe000000, 0xffffffffffffffff, 0x0) [ 1019.278882][ T8958] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1019.312936][ T8960] loop3: p1 p3 p4 [ 1019.316756][ T1439] loop5: p1 < > p3 p4 [ 1019.319178][ T8960] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1019.320825][ T1439] loop5: partition table partially beyond EOD, truncated [ 1019.329235][ T8960] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1019.336084][ T1439] loop5: p1 start 1275068416 is beyond EOD, truncated [ 1019.349329][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1019.351758][ T8842] loop1: detected capacity change from 0 to 90881 [ 1019.367789][ T1439] loop5: p1 < > p3 p4 [ 1019.371924][ T1439] loop5: partition table partially beyond EOD, truncated [ 1019.379355][ T9068] loop4: detected capacity change from 0 to 90881 [ 1019.379457][ T8960] loop3: detected capacity change from 0 to 36609 [ 1019.387842][ T1439] loop5: p1 start 1275068416 is beyond EOD, truncated [ 1019.399374][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1019.407924][ T8956] loop5: p1 < > p3 p4 [ 1019.412062][ T8956] loop5: partition table partially beyond EOD, truncated [ 1019.412822][ T8842] loop1: p1 p3 p4 [ 1019.419300][ T8956] loop5: p1 start 1275068416 is beyond EOD, truncated [ 1019.423230][ T8960] loop3: p1 p3 p4 [ 1019.430239][ T8842] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1019.435602][ T8956] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1019.440844][ T8960] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1019.447790][ T9068] loop4: p1 p3 p4 [ 1019.457012][ T8842] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1019.459702][ T9068] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1019.470886][ T8960] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1019.478556][ T9068] loop4: p4 size 3674243072 extends beyond EOD, truncated 22:53:34 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x10000000, 0xffffffffffffffff, 0x0) 22:53:34 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5200}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:34 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa900080000000003cc00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:34 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f00180705000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 1019.495044][ T8956] loop5: detected capacity change from 0 to 69377 [ 1019.516961][ T1439] loop3: p1 p3 p4 [ 1019.524150][ T9071] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1019.524560][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1019.543182][ T8956] loop5: p1 < > p3 p4 [ 1019.547404][ T8956] loop5: partition table partially beyond EOD, truncated [ 1019.556075][ T8956] loop5: p1 start 1275068416 is beyond EOD, truncated [ 1019.563003][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1019.566051][ T9068] loop4: detected capacity change from 0 to 90881 [ 1019.570895][ T9115] loop1: detected capacity change from 0 to 90881 [ 1019.577912][ T8956] loop5: p4 size 3674243072 extends beyond EOD, truncated 22:53:34 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000068ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:34 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x11000000, 0xffffffffffffffff, 0x0) 22:53:34 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6603}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1019.623278][ T9068] loop4: p1 p3 p4 [ 1019.627197][ T9068] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1019.635373][ T9115] loop1: p1 p3 p4 [ 1019.637512][ T9068] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1019.639294][ T9115] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1019.655663][ T9115] loop1: p4 size 3674243072 extends beyond EOD, truncated 22:53:34 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x12000000, 0xffffffffffffffff, 0x0) 22:53:34 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000004800024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:34 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x20000000, 0xffffffffffffffff, 0x0) [ 1019.661109][ T9178] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1019.678787][ T9183] loop3: detected capacity change from 0 to 264192 [ 1019.692158][ T9187] loop5: detected capacity change from 0 to 69377 [ 1019.701015][ T2835] udevd[2835]: inotify_add_watch(7, /dev/loop1p3, 10) failed: No such file or directory [ 1019.705436][ T1966] udevd[1966]: inotify_add_watch(7, /dev/loop1p1, 10) failed: No such file or directory 22:53:34 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x22000000, 0xffffffffffffffff, 0x0) 22:53:34 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x23000000, 0xffffffffffffffff, 0x0) [ 1019.711535][ T2953] udevd[2953]: inotify_add_watch(7, /dev/loop1p4, 10) failed: No such file or directory [ 1019.726616][ T9115] loop1: detected capacity change from 0 to 90881 [ 1019.736883][ T1439] loop3: p1 p3 p4 [ 1019.740863][ T1439] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1019.748920][ T9187] loop5: p1 < > p3 p4 [ 1019.753016][ T9187] loop5: partition table partially beyond EOD, truncated [ 1019.754011][ T1439] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1019.765902][ T9187] loop5: p1 start 1744830464 is beyond EOD, truncated 22:53:34 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x27000000, 0xffffffffffffffff, 0x0) 22:53:34 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x3f000000, 0xffffffffffffffff, 0x0) [ 1019.775874][ T9259] loop4: detected capacity change from 0 to 90881 [ 1019.781890][ T9183] loop3: p1 p3 p4 [ 1019.786245][ T9115] loop1: p1 p3 p4 [ 1019.786320][ T9187] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1019.791663][ T9115] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1019.802535][ T9183] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1019.814341][ T9115] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1019.815835][ T9183] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1019.821983][ T9259] loop4: p1 p3 p4 [ 1019.835034][ T9259] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1019.846805][ T9259] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1019.851744][ T9187] loop5: detected capacity change from 0 to 69377 22:53:34 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa900080000000001cf00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 1019.885143][ T9183] loop3: detected capacity change from 0 to 264192 [ 1019.893316][ T1439] loop5: p1 < > p3 p4 [ 1019.897499][ T1439] loop5: partition table partially beyond EOD, truncated [ 1019.904910][ T1439] loop5: p1 start 1744830464 is beyond EOD, truncated [ 1019.913227][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1019.915291][ T9259] loop4: detected capacity change from 0 to 90881 [ 1019.928033][ T9187] loop5: p1 < > p3 p4 [ 1019.932186][ T9187] loop5: partition table partially beyond EOD, truncated [ 1019.932547][ T9306] loop1: detected capacity change from 0 to 90881 [ 1019.940862][ T9183] loop3: p1 p3 p4 [ 1019.946682][ T9187] loop5: p1 start 1744830464 is beyond EOD, truncated [ 1019.949870][ T9183] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1019.956919][ T9187] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1019.965835][ T9183] loop3: p4 size 3674243072 extends beyond EOD, truncated 22:53:34 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6800}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:34 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x40000000, 0xffffffffffffffff, 0x0) 22:53:34 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a00006cff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 1019.991828][ T9259] loop4: p1 p3 p4 [ 1019.991828][ T9306] loop1: p1 p3 p4 [ 1019.992100][ T9306] loop1: p1 size 11290111 extends beyond EOD, [ 1019.995799][ T9259] loop4: p1 size 11290111 extends beyond EOD, [ 1019.999328][ T9306] truncated [ 1020.000145][ T9306] loop1: p4 size 3674243072 extends beyond EOD, [ 1020.005526][ T9259] truncated [ 1020.019521][ T9259] loop4: p4 size 3674243072 extends beyond EOD, [ 1020.021114][ T9306] truncated 22:53:34 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f00180805000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:34 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x48000000, 0xffffffffffffffff, 0x0) 22:53:34 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000004c00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:34 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x48020000, 0xffffffffffffffff, 0x0) [ 1020.030599][ T9310] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1020.033800][ T9259] truncated [ 1020.049182][ T9312] loop5: detected capacity change from 0 to 69377 [ 1020.068140][ T9350] loop3: detected capacity change from 0 to 32513 22:53:34 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:34 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x4c000000, 0xffffffffffffffff, 0x0) 22:53:34 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x50ae1d00, 0xffffffffffffffff, 0x0) [ 1020.090973][ T9306] loop1: detected capacity change from 0 to 90881 [ 1020.100734][ T9423] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1020.113465][ T1439] loop5: p1 < > p3 p4 [ 1020.117628][ T1439] loop5: partition table partially beyond EOD, truncated [ 1020.125801][ T9350] loop3: p1 p3 p4 [ 1020.129742][ T9350] loop3: p1 size 11290111 extends beyond EOD, truncated 22:53:34 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x52000000, 0xffffffffffffffff, 0x0) [ 1020.130463][ T1439] loop5: p1 start 1811939328 is beyond EOD, truncated [ 1020.137304][ T9446] loop4: detected capacity change from 0 to 90881 [ 1020.150671][ T9306] loop1: p1 p3 p4 [ 1020.152247][ T9350] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1020.157260][ T9306] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1020.164712][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1020.177043][ T1439] loop5: p1 < > p3 p4 [ 1020.181124][ T1439] loop5: partition table partially beyond EOD, truncated [ 1020.189503][ T1439] loop5: p1 start 1811939328 is beyond EOD, truncated [ 1020.190708][ T9306] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1020.197676][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1020.210702][ T9446] loop4: p1 p3 p4 [ 1020.214625][ T9446] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1020.216163][ T9312] loop5: p1 < > p3 p4 [ 1020.225680][ T9312] loop5: partition table partially beyond EOD, truncated [ 1020.227832][ T9350] loop3: detected capacity change from 0 to 32513 22:53:35 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa900080000000003d200024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:35 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x68000000, 0xffffffffffffffff, 0x0) 22:53:35 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7400}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1020.233068][ T9312] loop5: p1 start 1811939328 is beyond EOD, truncated [ 1020.239886][ T9446] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1020.247602][ T9312] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1020.265795][ T9537] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1020.282898][ T9350] loop3: p1 p3 p4 [ 1020.286800][ T9350] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1020.297630][ T9565] loop1: detected capacity change from 0 to 90881 [ 1020.303348][ T9312] loop5: detected capacity change from 0 to 69377 [ 1020.310976][ T9446] loop4: detected capacity change from 0 to 90881 [ 1020.312138][ T9350] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1020.351942][ T9446] loop4: p1 p3 p4 [ 1020.352161][ T9565] loop1: p1 p3 p4 [ 1020.356131][ T9446] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1020.359902][ T9565] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1020.369064][ T9446] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1020.374142][ T9312] loop5: p1 < > p3 p4 [ 1020.384917][ T9312] loop5: partition table partially beyond EOD, truncated [ 1020.386792][ T9565] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1020.395713][ T9312] loop5: p1 start 1811939328 is beyond EOD, truncated [ 1020.412878][ T9312] loop5: p4 size 3674243072 extends beyond EOD, truncated 22:53:35 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000074ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:35 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x6c000000, 0xffffffffffffffff, 0x0) 22:53:35 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:35 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f00180905000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:35 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000005400024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 1020.446403][ T9565] loop1: detected capacity change from 0 to 90881 [ 1020.453988][ T1439] loop5: p1 < > p3 p4 [ 1020.458067][ T1439] loop5: partition table partially beyond EOD, truncated [ 1020.467800][ T1439] loop5: p1 start 1811939328 is beyond EOD, truncated [ 1020.467987][ T9644] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1020.476113][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated 22:53:35 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x6f010000, 0xffffffffffffffff, 0x0) 22:53:35 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x74000000, 0xffffffffffffffff, 0x0) 22:53:35 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x7a000000, 0xffffffffffffffff, 0x0) [ 1020.495989][ T9648] loop3: detected capacity change from 0 to 264192 [ 1020.497502][ T9649] loop4: detected capacity change from 0 to 90881 [ 1020.515594][ T9565] loop1: p1 p3 p4 [ 1020.519507][ T9565] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1020.527823][ T9565] loop1: p4 size 3674243072 extends beyond EOD, truncated 22:53:35 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x8cffffff, 0xffffffffffffffff, 0x0) 22:53:35 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa900080000000002dc00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 1020.544878][ T9649] loop4: p1 p3 p4 [ 1020.545651][ T9648] loop3: p1 p3 p4 [ 1020.549035][ T9649] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1020.560374][ T9649] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1020.561942][ T9648] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1020.586332][ T9648] loop3: p4 size 3674243072 extends beyond EOD, truncated 22:53:35 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x9e010000, 0xffffffffffffffff, 0x0) 22:53:35 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xab00}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1020.588585][ T9763] loop5: detected capacity change from 0 to 69377 [ 1020.594338][ T9649] loop4: detected capacity change from 0 to 90881 [ 1020.619862][ T9769] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1020.643764][ T1439] loop5: p1 < > p3 p4 [ 1020.647868][ T1439] loop5: partition table partially beyond EOD, truncated [ 1020.650748][ T9648] loop3: detected capacity change from 0 to 264192 [ 1020.654993][ T9649] loop4: p1 p3 p4 [ 1020.662641][ T1439] loop5: p1 start 1946157056 is beyond EOD, truncated [ 1020.667484][ T9825] loop1: detected capacity change from 0 to 90881 [ 1020.673305][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1020.678589][ T9649] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1020.693634][ T9649] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1020.697868][ T1439] loop5: p1 < > p3 p4 [ 1020.704899][ T1439] loop5: partition table partially beyond EOD, truncated [ 1020.712351][ T9648] loop3: p1 p3 p4 [ 1020.712321][ T1439] loop5: p1 start 1946157056 is beyond EOD, truncated [ 1020.716124][ T9648] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1020.727494][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1020.731797][ T9648] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1020.745614][ T9825] loop1: p1 p3 p4 [ 1020.746677][ T9763] loop5: p1 < > p3 p4 [ 1020.749439][ T9825] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1020.753462][ T9763] loop5: partition table partially beyond EOD, truncated [ 1020.761213][ T9825] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1020.770083][ T9763] loop5: p1 start 1946157056 is beyond EOD, truncated [ 1020.781961][ T9763] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1020.816124][ T9825] loop1: detected capacity change from 0 to 90881 [ 1020.840593][ T9763] loop5: detected capacity change from 0 to 69377 [ 1020.851882][ T9825] loop1: p1 p3 p4 [ 1020.856072][ T9825] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1020.864174][ T9825] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1020.901950][ T1439] loop5: p1 < > p3 p4 [ 1020.906051][ T1439] loop5: partition table partially beyond EOD, truncated [ 1020.913380][ T1439] loop5: p1 start 1946157056 is beyond EOD, truncated [ 1020.920807][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1020.931674][ T9763] loop5: p1 < > p3 p4 [ 1020.935787][ T9763] loop5: partition table partially beyond EOD, truncated [ 1020.943153][ T9763] loop5: p1 start 1946157056 is beyond EOD, truncated [ 1020.950409][ T9763] loop5: p4 size 3674243072 extends beyond EOD, truncated 22:53:35 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a00007aff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:35 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0xb6010000, 0xffffffffffffffff, 0x0) 22:53:35 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb601}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:35 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000005500024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:35 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f00180a05000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:35 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa900080000000001e000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 1020.992625][ T1439] loop5: p1 < > p3 p4 [ 1020.996771][ T1439] loop5: partition table partially beyond EOD, truncated [ 1021.004019][ T1439] loop5: p1 start 1946157056 is beyond EOD, truncated [ 1021.013258][ T9876] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1021.016535][ T9878] loop3: detected capacity change from 0 to 28417 [ 1021.026986][ T9879] loop1: detected capacity change from 0 to 90881 22:53:35 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0xd1000000, 0xffffffffffffffff, 0x0) 22:53:35 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0xf6ffffff, 0xffffffffffffffff, 0x0) 22:53:35 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0xfeffffff, 0xffffffffffffffff, 0x0) 22:53:35 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:35 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0xffff8000, 0xffffffffffffffff, 0x0) [ 1021.033487][ T9880] loop4: detected capacity change from 0 to 90881 [ 1021.046284][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated 22:53:35 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0xffffff7f, 0xffffffffffffffff, 0x0) [ 1021.083075][ T9879] loop1: p1 p3 p4 [ 1021.083461][ T9996] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1021.086930][ T9879] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1021.111347][ T9880] loop4: p1 p3 p4 [ 1021.114425][ T9878] loop3: p1 p3 p4 [ 1021.119410][ T9878] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1021.121675][ T9880] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1021.128315][ T9878] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1021.135833][ T9880] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1021.144128][ T9879] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1021.161704][T10048] loop5: detected capacity change from 0 to 69377 [ 1021.182183][ T9878] loop3: detected capacity change from 0 to 28417 [ 1021.198648][ T9880] loop4: detected capacity change from 0 to 90881 [ 1021.201979][ T1439] loop5: p1 < > p3 p4 [ 1021.209270][ T1439] loop5: partition table partially beyond EOD, truncated [ 1021.213413][ T9878] loop3: p1 p3 p4 [ 1021.216599][ T1439] loop5: p1 start 2046820352 is beyond EOD, truncated [ 1021.220417][ T9878] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1021.227390][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1021.236379][ T9880] loop4: p1 p3 p4 [ 1021.242389][ T9878] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1021.245544][ T9880] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1021.262223][T10048] loop5: p1 < > p3 p4 [ 1021.262241][ T9880] loop4: p4 size 3674243072 extends beyond EOD, [ 1021.266303][T10048] loop5: partition table partially beyond EOD, [ 1021.266309][ T9880] truncated [ 1021.282027][T10048] truncated [ 1021.285732][T10048] loop5: p1 start 2046820352 is beyond EOD, truncated [ 1021.293006][T10048] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1021.348313][T10048] loop5: detected capacity change from 0 to 69377 [ 1021.402219][ T1439] loop5: p1 < > p3 p4 [ 1021.406330][ T1439] loop5: partition table partially beyond EOD, truncated [ 1021.413714][ T1439] loop5: p1 start 2046820352 is beyond EOD, truncated [ 1021.421041][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1021.430228][T10048] loop5: p1 < > p3 p4 [ 1021.434361][T10048] loop5: partition table partially beyond EOD, truncated [ 1021.441548][T10048] loop5: p1 start 2046820352 is beyond EOD, truncated 22:53:36 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a0000e1ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:36 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0xffffff8c, 0xffffffffffffffff, 0x0) 22:53:36 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa900080000000003e200024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:36 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:36 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f00180b05000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:36 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000006000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:36 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0xfffffff6, 0xffffffffffffffff, 0x0) 22:53:36 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0xfffffffe, 0xffffffffffffffff, 0x0) 22:53:36 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x200000000, 0xffffffffffffffff, 0x0) [ 1021.448663][T10048] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1021.467117][T10107] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1021.469395][T10109] loop3: detected capacity change from 0 to 264192 [ 1021.480402][T10110] loop4: detected capacity change from 0 to 90881 [ 1021.486238][T10111] loop1: detected capacity change from 0 to 90881 22:53:36 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1021.523023][T10110] loop4: p1 p3 p4 [ 1021.525623][T10109] loop3: p1 p3 p4 [ 1021.530000][T10110] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1021.530699][T10109] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1021.539658][T10110] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1021.549019][T10109] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1021.563390][T10111] loop1: p1 p3 p4 [ 1021.567260][T10111] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1021.584182][T10224] loop5: detected capacity change from 0 to 69377 [ 1021.587784][T10111] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1021.597944][T10222] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 22:53:36 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x800000000, 0xffffffffffffffff, 0x0) [ 1021.616879][ T1906] udevd[1906]: inotify_add_watch(7, /dev/loop4p1, 10) failed: No such file or directory [ 1021.621206][T10110] loop4: detected capacity change from 0 to 90881 [ 1021.628098][ T1439] loop5: p1 < > p3 p4 [ 1021.637131][ T1439] loop5: partition table partially beyond EOD, truncated [ 1021.639357][T10109] loop3: detected capacity change from 0 to 264192 [ 1021.649103][ T1439] loop5: p1 start 3774873600 is beyond EOD, truncated [ 1021.657948][T10111] loop1: detected capacity change from 0 to 90881 [ 1021.664862][T10110] loop4: p1 p3 p4 [ 1021.666711][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1021.668713][T10110] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1021.684365][T10109] loop3: p1 p3 p4 [ 1021.688918][T10109] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1021.690940][T10110] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1021.697513][T10109] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1021.703074][ T1439] loop5: p1 < > p3 p4 [ 1021.714410][ T1439] loop5: partition table partially beyond EOD, truncated 22:53:36 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa900080000ffffffe400024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 1021.723145][ T1439] loop5: p1 start 3774873600 is beyond EOD, truncated [ 1021.730386][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1021.748673][T10224] loop5: p1 < > p3 p4 [ 1021.752894][T10224] loop5: partition table partially beyond EOD, truncated [ 1021.759996][T10224] loop5: p1 start 3774873600 is beyond EOD, truncated [ 1021.767237][T10224] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1021.778447][T10329] loop1: detected capacity change from 0 to 90881 [ 1021.823861][T10224] loop5: detected capacity change from 0 to 69377 [ 1021.832679][ T2932] loop1: p1 p3 p4 [ 1021.836585][ T2932] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1021.844364][ T2932] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1021.854888][T10329] loop_reread_partitions: partition scan of loop1 () failed (rc=-16) [ 1021.872687][ T1439] loop5: p1 < > p3 p4 [ 1021.876765][ T1439] loop5: partition table partially beyond EOD, truncated [ 1021.884162][ T1439] loop5: p1 start 3774873600 is beyond EOD, truncated [ 1021.891369][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1021.900019][T10224] loop5: p1 < > p3 p4 [ 1021.904194][T10224] loop5: partition table partially beyond EOD, truncated [ 1021.911277][T10224] loop5: p1 start 3774873600 is beyond EOD, truncated 22:53:36 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a0000000200000000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:36 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x1000001000, 0xffffffffffffffff, 0x0) 22:53:36 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f00180c05000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:36 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400001}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:36 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000006300024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:36 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa900080000000000ec00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:36 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x2000000000, 0xffffffffffffffff, 0x0) [ 1021.918776][T10224] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1021.936107][T10335] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1021.938502][T10337] loop1: detected capacity change from 0 to 90881 [ 1021.948221][T10336] loop4: detected capacity change from 0 to 90881 [ 1021.964074][T10340] loop3: detected capacity change from 0 to 24321 [ 1021.978027][ T1439] loop5: p1 < > p3 p4 [ 1021.982187][ T1439] loop5: partition table partially beyond EOD, truncated [ 1021.991912][T10337] loop1: p1 p3 p4 [ 1021.992699][ T1439] loop5: p1 start 3774873600 is beyond EOD, truncated [ 1021.995895][T10337] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1022.003883][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1022.011420][T10336] loop4: p1 p3 p4 [ 1022.021075][T10340] loop3: p1 p3 p4 22:53:36 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80ffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1022.021118][T10336] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1022.027225][T10340] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1022.040688][T10337] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1022.042347][T10336] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1022.050334][T10340] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1022.064312][T10445] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 22:53:36 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x4000000000, 0xffffffffffffffff, 0x0) 22:53:36 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x1000000000000, 0xffffffffffffffff, 0x0) [ 1022.080033][ T1439] loop5: p1 < > p3 p4 [ 1022.084208][ T1439] loop5: partition table partially beyond EOD, truncated [ 1022.093663][ T1439] loop5: p1 start 3774873600 is beyond EOD, truncated [ 1022.104821][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1022.104938][T10337] loop1: detected capacity change from 0 to 90881 22:53:36 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1022.130352][T10340] loop3: detected capacity change from 0 to 24321 [ 1022.142540][T10337] loop1: p1 p3 p4 [ 1022.142978][T10336] loop4: detected capacity change from 0 to 90881 [ 1022.146335][T10337] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1022.162592][T10447] loop5: detected capacity change from 0 to 69377 22:53:37 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x10000000000000, 0xffffffffffffffff, 0x0) [ 1022.174359][T10337] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1022.184028][T10336] loop4: p1 p3 p4 [ 1022.188187][ T1439] loop5: p1 < > p3 p4 [ 1022.193505][T10340] loop3: p1 p3 p4 [ 1022.195090][T10336] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1022.198173][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1022.211484][T10554] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1022.211644][T10340] loop3: p1 size 11290111 extends beyond EOD, truncated 22:53:37 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000000f108000000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:37 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa900080000ffffffee00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:37 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f00180d05000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:37 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x10000010000000, 0xffffffffffffffff, 0x0) 22:53:37 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1004000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:37 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000006800024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 1022.233275][T10336] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1022.241207][T10340] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1022.251557][ T1439] loop5: p1 < > p3 p4 [ 1022.257130][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1022.270542][T10447] loop5: p1 < > p3 p4 [ 1022.275681][T10447] loop5: p4 size 3674243072 extends beyond EOD, truncated 22:53:37 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x20000000000000, 0xffffffffffffffff, 0x0) [ 1022.303868][T10660] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1022.333242][T10681] loop1: detected capacity change from 0 to 90881 [ 1022.347409][T10740] loop4: detected capacity change from 0 to 90881 22:53:37 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:37 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x40000000000000, 0xffffffffffffffff, 0x0) [ 1022.354601][T10741] loop3: detected capacity change from 0 to 264192 [ 1022.364469][T10772] loop5: detected capacity change from 0 to 69377 [ 1022.372710][ T2932] loop1: p1 p3 p4 [ 1022.376706][ T2932] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1022.383151][T10774] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1022.387847][ T2932] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1022.406384][ T2931] loop3: p1 p3 p4 [ 1022.408869][ T1439] loop5: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1022.411746][T10681] loop1: p1 p3 p4 [ 1022.503048][T10740] loop4: p1 p3 p4 [ 1022.504684][ T2931] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1022.507248][T10740] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1022.515918][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1022.521824][T10681] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1022.535035][T10740] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1022.544141][ T2931] loop3: p4 size 3674243072 extends beyond EOD, truncated 22:53:37 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:37 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000006c00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 1022.544759][T10681] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1022.571803][T10741] loop3: p1 p3 p4 [ 1022.588478][T10741] loop3: p1 size 11290111 extends beyond EOD, truncated 22:53:37 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x40000100000000, 0xffffffffffffffff, 0x0) [ 1022.596396][T10879] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1022.601150][T10741] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1022.626998][T10681] loop1: detected capacity change from 0 to 90881 [ 1022.640291][T10892] loop4: detected capacity change from 0 to 90881 [ 1022.674098][T10892] loop4: p1 p3 p4 [ 1022.678063][T10892] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1022.685533][T10681] loop1: p1 p3 p4 [ 1022.689384][T10681] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1022.705660][T10892] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1022.717933][T10681] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1022.769716][T10892] loop4: detected capacity change from 0 to 90881 [ 1022.821756][T10892] loop4: p1 p3 p4 [ 1022.825600][T10892] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1022.826934][T10772] loop5: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1022.835683][T10892] loop4: p4 size 3674243072 extends beyond EOD, [ 1022.835858][T10772] loop5: p4 size 3674243072 extends beyond EOD, [ 1022.923278][T10892] truncated [ 1022.939072][T10772] truncated 22:53:38 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000000008000db00ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:38 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f00180e05000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:38 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:38 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x80ffff00000000, 0xffffffffffffffff, 0x0) 22:53:38 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa900080000000003ef00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:38 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000007200024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 1023.275948][T10989] loop3: detected capacity change from 0 to 20225 [ 1023.278346][T10991] loop1: detected capacity change from 0 to 90881 [ 1023.284441][T10992] loop4: detected capacity change from 0 to 90881 [ 1023.297505][T10994] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1023.314374][T10991] loop1: p1 p3 p4 22:53:38 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:38 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x100000000000000, 0xffffffffffffffff, 0x0) [ 1023.323244][T11026] loop5: detected capacity change from 0 to 69377 [ 1023.325593][T10991] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1023.345741][T10991] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1023.359996][T11100] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1023.365214][T10992] loop4: p1 p3 p4 [ 1023.375667][T10989] loop3: p1 p3 p4 [ 1023.376883][T10992] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1023.380797][T10989] loop3: p1 size 11290111 extends beyond EOD, truncated 22:53:38 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1023.401249][ T1439] loop5: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1023.406519][T10991] loop1: detected capacity change from 0 to 90881 [ 1023.500901][ T1439] loop5: p4 size 3674243072 extends beyond EOD, [ 1023.500948][T10992] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1023.507318][ T1439] truncated [ 1023.509494][ T1439] loop5: p6 size 3674243072 extends beyond EOD, truncated 22:53:38 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x200000000000000, 0xffffffffffffffff, 0x0) 22:53:38 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa900080000000000f200024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 1023.528136][T10989] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1023.531308][T11204] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1023.546560][ T1439] loop5: p8 size 3674243072 extends beyond EOD, truncated [ 1023.556155][ T1439] loop5: p10 size 3674243072 extends beyond EOD, truncated 22:53:38 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1023.574979][T10992] loop4: detected capacity change from 0 to 90881 [ 1023.582924][T10989] loop3: detected capacity change from 0 to 20225 [ 1023.584882][ T1439] loop5: p12 size 3674243072 extends beyond EOD, truncated [ 1023.597512][T11309] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1023.604471][ T1439] loop5: p14 size 3674243072 extends beyond EOD, truncated [ 1023.617533][ T1439] loop5: p16 size 3674243072 extends beyond EOD, truncated [ 1023.625269][T10989] loop3: p1 p3 p4 [ 1023.629231][T10989] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1023.633144][T10992] loop4: p1 p3 p4 [ 1023.638312][T11375] loop1: detected capacity change from 0 to 90881 [ 1023.640050][T10992] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1023.648514][T10989] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1023.655742][ T1439] loop5: p18 size 3674243072 extends beyond EOD, truncated [ 1023.668423][T10992] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1023.669741][ T1439] loop5: p20 size 3674243072 extends beyond EOD, truncated [ 1023.683766][ T1439] loop5: p22 size 3674243072 extends beyond EOD, truncated [ 1023.691853][ T1439] loop5: p24 size 3674243072 extends beyond EOD, truncated [ 1023.692051][T11375] loop1: p1 p3 p4 [ 1023.700125][ T1439] loop5: p26 size 3674243072 extends beyond EOD, truncated [ 1023.704538][T11375] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1023.713604][ T1439] loop5: p28 size 3674243072 extends beyond EOD, truncated [ 1023.728824][T11375] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1023.729173][ T1439] loop5: p30 size 3674243072 extends beyond EOD, truncated [ 1023.744515][ T1439] loop5: p32 size 3674243072 extends beyond EOD, truncated [ 1023.752639][ T1439] loop5: p34 size 3674243072 extends beyond EOD, truncated [ 1023.760605][ T1439] loop5: p36 size 3674243072 extends beyond EOD, truncated [ 1023.768959][ T1439] loop5: p38 size 3674243072 extends beyond EOD, truncated [ 1023.777782][ T1439] loop5: p40 size 3674243072 extends beyond EOD, truncated [ 1023.785991][ T1439] loop5: p42 size 3674243072 extends beyond EOD, truncated [ 1023.794504][ T1439] loop5: p44 size 3674243072 extends beyond EOD, truncated [ 1023.798904][T11375] loop1: detected capacity change from 0 to 90881 [ 1023.803921][ T1439] loop5: p46 size 3674243072 extends beyond EOD, truncated [ 1023.816269][ T1439] loop5: p48 size 3674243072 extends beyond EOD, truncated [ 1023.824514][ T1439] loop5: p50 size 3674243072 extends beyond EOD, truncated [ 1023.833165][T11375] loop1: p1 p3 p4 [ 1023.833953][ T1439] loop5: p52 size 3674243072 extends beyond EOD, truncated [ 1023.837027][T11375] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1023.845579][ T1439] loop5: p54 size 3674243072 extends beyond EOD, truncated [ 1023.853395][T11375] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1023.859493][ T1439] loop5: p56 size 3674243072 extends beyond EOD, truncated [ 1023.873575][ T1439] loop5: p58 size 3674243072 extends beyond EOD, truncated [ 1023.881972][ T1439] loop5: p60 size 3674243072 extends beyond EOD, truncated [ 1023.890009][ T1439] loop5: p62 size 3674243072 extends beyond EOD, truncated [ 1023.898299][ T1439] loop5: p64 size 3674243072 extends beyond EOD, truncated [ 1023.907010][ T1439] loop5: p66 size 3674243072 extends beyond EOD, truncated [ 1023.915168][ T1439] loop5: p68 size 3674243072 extends beyond EOD, truncated [ 1023.923890][ T1439] loop5: p70 size 3674243072 extends beyond EOD, truncated [ 1023.932488][ T1439] loop5: p72 size 3674243072 extends beyond EOD, truncated [ 1023.940377][ T1439] loop5: p74 size 3674243072 extends beyond EOD, truncated [ 1023.948259][ T1439] loop5: p76 size 3674243072 extends beyond EOD, truncated [ 1023.956414][ T1439] loop5: p78 size 3674243072 extends beyond EOD, truncated [ 1023.964355][ T1439] loop5: p80 size 3674243072 extends beyond EOD, truncated [ 1023.972423][ T1439] loop5: p82 size 3674243072 extends beyond EOD, truncated [ 1023.980393][ T1439] loop5: p84 size 3674243072 extends beyond EOD, truncated [ 1023.988426][ T1439] loop5: p86 size 3674243072 extends beyond EOD, truncated [ 1023.996401][ T1439] loop5: p88 size 3674243072 extends beyond EOD, truncated [ 1024.004396][ T1439] loop5: p90 size 3674243072 extends beyond EOD, truncated [ 1024.012427][ T1439] loop5: p92 size 3674243072 extends beyond EOD, truncated [ 1024.020400][ T1439] loop5: p94 size 3674243072 extends beyond EOD, truncated [ 1024.029984][ T1439] loop5: p96 size 3674243072 extends beyond EOD, truncated [ 1024.038147][ T1439] loop5: p98 size 3674243072 extends beyond EOD, truncated [ 1024.047098][ T1439] loop5: p100 size 3674243072 extends beyond EOD, truncated [ 1024.055439][ T1439] loop5: p102 size 3674243072 extends beyond EOD, truncated [ 1024.064644][ T1439] loop5: p104 size 3674243072 extends beyond EOD, truncated [ 1024.073124][ T1439] loop5: p106 size 3674243072 extends beyond EOD, truncated [ 1024.081026][ T1439] loop5: p108 size 3674243072 extends beyond EOD, truncated [ 1024.091144][ T1439] loop5: p110 size 3674243072 extends beyond EOD, truncated [ 1024.099207][ T1439] loop5: p112 size 3674243072 extends beyond EOD, truncated [ 1024.107461][ T1439] loop5: p114 size 3674243072 extends beyond EOD, truncated [ 1024.115523][ T1439] loop5: p116 size 3674243072 extends beyond EOD, truncated [ 1024.123580][ T1439] loop5: p118 size 3674243072 extends beyond EOD, truncated [ 1024.131587][ T1439] loop5: p120 size 3674243072 extends beyond EOD, truncated [ 1024.139768][ T1439] loop5: p122 size 3674243072 extends beyond EOD, truncated [ 1024.147872][ T1439] loop5: p124 size 3674243072 extends beyond EOD, truncated [ 1024.156068][ T1439] loop5: p126 size 3674243072 extends beyond EOD, truncated [ 1024.164494][ T1439] loop5: p128 size 3674243072 extends beyond EOD, truncated [ 1024.172704][ T1439] loop5: p130 size 3674243072 extends beyond EOD, truncated [ 1024.180823][ T1439] loop5: p132 size 3674243072 extends beyond EOD, truncated [ 1024.189340][ T1439] loop5: p134 size 3674243072 extends beyond EOD, truncated [ 1024.197720][ T1439] loop5: p136 size 3674243072 extends beyond EOD, truncated [ 1024.206464][ T1439] loop5: p138 size 3674243072 extends beyond EOD, truncated [ 1024.214805][ T1439] loop5: p140 size 3674243072 extends beyond EOD, truncated [ 1024.223011][ T1439] loop5: p142 size 3674243072 extends beyond EOD, truncated [ 1024.231463][ T1439] loop5: p144 size 3674243072 extends beyond EOD, truncated [ 1024.239524][ T1439] loop5: p146 size 3674243072 extends beyond EOD, truncated [ 1024.248014][ T1439] loop5: p148 size 3674243072 extends beyond EOD, truncated [ 1024.256278][ T1439] loop5: p150 size 3674243072 extends beyond EOD, truncated [ 1024.264865][ T1439] loop5: p152 size 3674243072 extends beyond EOD, truncated [ 1024.273207][ T1439] loop5: p154 size 3674243072 extends beyond EOD, truncated [ 1024.281092][ T1439] loop5: p156 size 3674243072 extends beyond EOD, truncated [ 1024.289587][ T1439] loop5: p158 size 3674243072 extends beyond EOD, truncated [ 1024.297657][ T1439] loop5: p160 size 3674243072 extends beyond EOD, truncated [ 1024.305718][ T1439] loop5: p162 size 3674243072 extends beyond EOD, truncated [ 1024.313884][ T1439] loop5: p164 size 3674243072 extends beyond EOD, truncated [ 1024.322014][ T1439] loop5: p166 size 3674243072 extends beyond EOD, truncated [ 1024.330048][ T1439] loop5: p168 size 3674243072 extends beyond EOD, truncated [ 1024.338133][ T1439] loop5: p170 size 3674243072 extends beyond EOD, truncated [ 1024.346279][ T1439] loop5: p172 size 3674243072 extends beyond EOD, truncated [ 1024.354365][ T1439] loop5: p174 size 3674243072 extends beyond EOD, truncated [ 1024.363049][ T1439] loop5: p176 size 3674243072 extends beyond EOD, truncated [ 1024.370908][ T1439] loop5: p178 size 3674243072 extends beyond EOD, truncated [ 1024.379053][ T1439] loop5: p180 size 3674243072 extends beyond EOD, truncated [ 1024.387316][ T1439] loop5: p182 size 3674243072 extends beyond EOD, truncated [ 1024.395933][ T1439] loop5: p184 size 3674243072 extends beyond EOD, truncated [ 1024.404064][ T1439] loop5: p186 size 3674243072 extends beyond EOD, truncated [ 1024.412308][ T1439] loop5: p188 size 3674243072 extends beyond EOD, truncated [ 1024.420087][ T1439] loop5: p190 size 3674243072 extends beyond EOD, truncated [ 1024.428433][ T1439] loop5: p192 size 3674243072 extends beyond EOD, truncated [ 1024.436557][ T1439] loop5: p194 size 3674243072 extends beyond EOD, truncated [ 1024.445041][ T1439] loop5: p196 size 3674243072 extends beyond EOD, truncated [ 1024.453244][ T1439] loop5: p198 size 3674243072 extends beyond EOD, truncated [ 1024.461347][ T1439] loop5: p200 size 3674243072 extends beyond EOD, truncated [ 1024.469728][ T1439] loop5: p202 size 3674243072 extends beyond EOD, truncated [ 1024.478057][ T1439] loop5: p204 size 3674243072 extends beyond EOD, truncated [ 1024.486224][ T1439] loop5: p206 size 3674243072 extends beyond EOD, truncated [ 1024.495147][ T1439] loop5: p208 size 3674243072 extends beyond EOD, truncated [ 1024.503221][ T1439] loop5: p210 size 3674243072 extends beyond EOD, truncated [ 1024.511262][ T1439] loop5: p212 size 3674243072 extends beyond EOD, truncated [ 1024.519361][ T1439] loop5: p214 size 3674243072 extends beyond EOD, truncated [ 1024.527336][ T1439] loop5: p216 size 3674243072 extends beyond EOD, truncated [ 1024.535363][ T1439] loop5: p218 size 3674243072 extends beyond EOD, truncated [ 1024.543454][ T1439] loop5: p220 size 3674243072 extends beyond EOD, truncated [ 1024.551406][ T1439] loop5: p222 size 3674243072 extends beyond EOD, truncated [ 1024.559419][ T1439] loop5: p224 size 3674243072 extends beyond EOD, truncated [ 1024.567398][ T1439] loop5: p226 size 3674243072 extends beyond EOD, truncated [ 1024.575362][ T1439] loop5: p228 size 3674243072 extends beyond EOD, truncated [ 1024.583325][ T1439] loop5: p230 size 3674243072 extends beyond EOD, truncated [ 1024.591216][ T1439] loop5: p232 size 3674243072 extends beyond EOD, truncated [ 1024.599401][ T1439] loop5: p234 size 3674243072 extends beyond EOD, truncated [ 1024.608343][ T1439] loop5: p236 size 3674243072 extends beyond EOD, truncated [ 1024.616565][ T1439] loop5: p238 size 3674243072 extends beyond EOD, truncated [ 1024.624852][ T1439] loop5: p240 size 3674243072 extends beyond EOD, truncated [ 1024.632879][ T1439] loop5: p242 size 3674243072 extends beyond EOD, truncated [ 1024.640807][ T1439] loop5: p244 size 3674243072 extends beyond EOD, truncated [ 1024.648981][ T1439] loop5: p246 size 3674243072 extends beyond EOD, truncated [ 1024.657147][ T1439] loop5: p248 size 3674243072 extends beyond EOD, truncated [ 1024.665248][ T1439] loop5: p250 size 3674243072 extends beyond EOD, truncated [ 1024.673872][ T1439] loop5: p252 size 3674243072 extends beyond EOD, truncated [ 1024.682119][ T1439] loop5: p254 size 3674243072 extends beyond EOD, truncated [ 1024.766856][T11026] loop5: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1024.767775][T11026] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1024.863491][T11026] loop5: p6 size 3674243072 extends beyond EOD, truncated [ 1024.871397][T11026] loop5: p8 size 3674243072 extends beyond EOD, truncated [ 1024.879528][T11026] loop5: p10 size 3674243072 extends beyond EOD, truncated [ 1024.887437][T11026] loop5: p12 size 3674243072 extends beyond EOD, truncated [ 1024.895401][T11026] loop5: p14 size 3674243072 extends beyond EOD, truncated [ 1024.903523][T11026] loop5: p16 size 3674243072 extends beyond EOD, truncated [ 1024.911371][T11026] loop5: p18 size 3674243072 extends beyond EOD, truncated [ 1024.919337][T11026] loop5: p20 size 3674243072 extends beyond EOD, truncated [ 1024.927245][T11026] loop5: p22 size 3674243072 extends beyond EOD, truncated [ 1024.935584][T11026] loop5: p24 size 3674243072 extends beyond EOD, truncated [ 1024.943923][T11026] loop5: p26 size 3674243072 extends beyond EOD, truncated [ 1024.952268][T11026] loop5: p28 size 3674243072 extends beyond EOD, truncated [ 1024.960074][T11026] loop5: p30 size 3674243072 extends beyond EOD, truncated [ 1024.968209][T11026] loop5: p32 size 3674243072 extends beyond EOD, truncated [ 1024.976209][T11026] loop5: p34 size 3674243072 extends beyond EOD, truncated [ 1024.984174][T11026] loop5: p36 size 3674243072 extends beyond EOD, truncated [ 1024.992153][T11026] loop5: p38 size 3674243072 extends beyond EOD, truncated [ 1025.000064][T11026] loop5: p40 size 3674243072 extends beyond EOD, truncated [ 1025.008117][T11026] loop5: p42 size 3674243072 extends beyond EOD, truncated [ 1025.016381][T11026] loop5: p44 size 3674243072 extends beyond EOD, truncated [ 1025.024387][T11026] loop5: p46 size 3674243072 extends beyond EOD, truncated [ 1025.032297][T11026] loop5: p48 size 3674243072 extends beyond EOD, truncated [ 1025.040182][T11026] loop5: p50 size 3674243072 extends beyond EOD, truncated [ 1025.048292][T11026] loop5: p52 size 3674243072 extends beyond EOD, truncated [ 1025.056568][T11026] loop5: p54 size 3674243072 extends beyond EOD, truncated [ 1025.064896][T11026] loop5: p56 size 3674243072 extends beyond EOD, truncated [ 1025.072747][T11026] loop5: p58 size 3674243072 extends beyond EOD, truncated [ 1025.080709][T11026] loop5: p60 size 3674243072 extends beyond EOD, truncated [ 1025.089004][T11026] loop5: p62 size 3674243072 extends beyond EOD, truncated [ 1025.097147][T11026] loop5: p64 size 3674243072 extends beyond EOD, truncated [ 1025.105300][T11026] loop5: p66 size 3674243072 extends beyond EOD, truncated [ 1025.113289][T11026] loop5: p68 size 3674243072 extends beyond EOD, truncated [ 1025.121390][T11026] loop5: p70 size 3674243072 extends beyond EOD, truncated [ 1025.129501][T11026] loop5: p72 size 3674243072 extends beyond EOD, truncated [ 1025.137492][T11026] loop5: p74 size 3674243072 extends beyond EOD, truncated [ 1025.145683][T11026] loop5: p76 size 3674243072 extends beyond EOD, truncated [ 1025.154029][T11026] loop5: p78 size 3674243072 extends beyond EOD, truncated [ 1025.162427][T11026] loop5: p80 size 3674243072 extends beyond EOD, truncated [ 1025.170756][T11026] loop5: p82 size 3674243072 extends beyond EOD, truncated [ 1025.179531][T11026] loop5: p84 size 3674243072 extends beyond EOD, truncated [ 1025.187696][T11026] loop5: p86 size 3674243072 extends beyond EOD, truncated [ 1025.195699][T11026] loop5: p88 size 3674243072 extends beyond EOD, truncated [ 1025.203973][T11026] loop5: p90 size 3674243072 extends beyond EOD, truncated [ 1025.212053][T11026] loop5: p92 size 3674243072 extends beyond EOD, truncated [ 1025.220079][T11026] loop5: p94 size 3674243072 extends beyond EOD, truncated [ 1025.228616][T11026] loop5: p96 size 3674243072 extends beyond EOD, truncated [ 1025.236780][T11026] loop5: p98 size 3674243072 extends beyond EOD, truncated [ 1025.244853][T11026] loop5: p100 size 3674243072 extends beyond EOD, truncated [ 1025.253117][T11026] loop5: p102 size 3674243072 extends beyond EOD, truncated [ 1025.261068][T11026] loop5: p104 size 3674243072 extends beyond EOD, truncated [ 1025.269998][T11026] loop5: p106 size 3674243072 extends beyond EOD, truncated [ 1025.278067][T11026] loop5: p108 size 3674243072 extends beyond EOD, truncated [ 1025.286149][T11026] loop5: p110 size 3674243072 extends beyond EOD, truncated [ 1025.294322][T11026] loop5: p112 size 3674243072 extends beyond EOD, truncated [ 1025.302981][T11026] loop5: p114 size 3674243072 extends beyond EOD, truncated [ 1025.311048][T11026] loop5: p116 size 3674243072 extends beyond EOD, truncated [ 1025.319345][T11026] loop5: p118 size 3674243072 extends beyond EOD, truncated [ 1025.327556][T11026] loop5: p120 size 3674243072 extends beyond EOD, truncated [ 1025.335986][T11026] loop5: p122 size 3674243072 extends beyond EOD, truncated [ 1025.344113][T11026] loop5: p124 size 3674243072 extends beyond EOD, truncated [ 1025.352408][T11026] loop5: p126 size 3674243072 extends beyond EOD, truncated [ 1025.360705][T11026] loop5: p128 size 3674243072 extends beyond EOD, truncated [ 1025.368894][T11026] loop5: p130 size 3674243072 extends beyond EOD, truncated [ 1025.377779][T11026] loop5: p132 size 3674243072 extends beyond EOD, truncated [ 1025.386416][T11026] loop5: p134 size 3674243072 extends beyond EOD, truncated [ 1025.394587][T11026] loop5: p136 size 3674243072 extends beyond EOD, truncated [ 1025.402685][T11026] loop5: p138 size 3674243072 extends beyond EOD, truncated [ 1025.410645][T11026] loop5: p140 size 3674243072 extends beyond EOD, truncated [ 1025.418556][T11026] loop5: p142 size 3674243072 extends beyond EOD, truncated [ 1025.426891][T11026] loop5: p144 size 3674243072 extends beyond EOD, truncated [ 1025.435014][T11026] loop5: p146 size 3674243072 extends beyond EOD, truncated [ 1025.443106][T11026] loop5: p148 size 3674243072 extends beyond EOD, truncated [ 1025.451116][T11026] loop5: p150 size 3674243072 extends beyond EOD, truncated [ 1025.459254][T11026] loop5: p152 size 3674243072 extends beyond EOD, truncated [ 1025.467337][T11026] loop5: p154 size 3674243072 extends beyond EOD, truncated [ 1025.475213][T11026] loop5: p156 size 3674243072 extends beyond EOD, truncated [ 1025.483445][T11026] loop5: p158 size 3674243072 extends beyond EOD, truncated [ 1025.491426][T11026] loop5: p160 size 3674243072 extends beyond EOD, truncated [ 1025.499624][T11026] loop5: p162 size 3674243072 extends beyond EOD, truncated [ 1025.507833][T11026] loop5: p164 size 3674243072 extends beyond EOD, truncated [ 1025.515710][T11026] loop5: p166 size 3674243072 extends beyond EOD, truncated [ 1025.523787][T11026] loop5: p168 size 3674243072 extends beyond EOD, truncated [ 1025.531872][T11026] loop5: p170 size 3674243072 extends beyond EOD, truncated [ 1025.539911][T11026] loop5: p172 size 3674243072 extends beyond EOD, truncated [ 1025.548042][T11026] loop5: p174 size 3674243072 extends beyond EOD, truncated [ 1025.556206][T11026] loop5: p176 size 3674243072 extends beyond EOD, truncated [ 1025.565272][T11026] loop5: p178 size 3674243072 extends beyond EOD, truncated [ 1025.573326][T11026] loop5: p180 size 3674243072 extends beyond EOD, truncated [ 1025.581268][T11026] loop5: p182 size 3674243072 extends beyond EOD, truncated [ 1025.589560][T11026] loop5: p184 size 3674243072 extends beyond EOD, truncated [ 1025.598306][T11026] loop5: p186 size 3674243072 extends beyond EOD, truncated [ 1025.606130][T11026] loop5: p188 size 3674243072 extends beyond EOD, truncated [ 1025.614283][T11026] loop5: p190 size 3674243072 extends beyond EOD, truncated [ 1025.622222][T11026] loop5: p192 size 3674243072 extends beyond EOD, truncated [ 1025.630134][T11026] loop5: p194 size 3674243072 extends beyond EOD, truncated [ 1025.638270][T11026] loop5: p196 size 3674243072 extends beyond EOD, truncated [ 1025.646408][T11026] loop5: p198 size 3674243072 extends beyond EOD, truncated [ 1025.654480][T11026] loop5: p200 size 3674243072 extends beyond EOD, truncated [ 1025.662580][T11026] loop5: p202 size 3674243072 extends beyond EOD, truncated [ 1025.670415][T11026] loop5: p204 size 3674243072 extends beyond EOD, truncated [ 1025.678559][T11026] loop5: p206 size 3674243072 extends beyond EOD, truncated [ 1025.686738][T11026] loop5: p208 size 3674243072 extends beyond EOD, truncated [ 1025.694850][T11026] loop5: p210 size 3674243072 extends beyond EOD, truncated [ 1025.704817][T11026] loop5: p212 size 3674243072 extends beyond EOD, truncated [ 1025.713164][T11026] loop5: p214 size 3674243072 extends beyond EOD, truncated [ 1025.721081][T11026] loop5: p216 size 3674243072 extends beyond EOD, truncated [ 1025.729192][T11026] loop5: p218 size 3674243072 extends beyond EOD, truncated [ 1025.737317][T11026] loop5: p220 size 3674243072 extends beyond EOD, truncated [ 1025.745670][T11026] loop5: p222 size 3674243072 extends beyond EOD, truncated [ 1025.753778][T11026] loop5: p224 size 3674243072 extends beyond EOD, truncated [ 1025.761984][T11026] loop5: p226 size 3674243072 extends beyond EOD, truncated [ 1025.770123][T11026] loop5: p228 size 3674243072 extends beyond EOD, truncated [ 1025.778087][T11026] loop5: p230 size 3674243072 extends beyond EOD, truncated [ 1025.786383][T11026] loop5: p232 size 3674243072 extends beyond EOD, truncated [ 1025.794573][T11026] loop5: p234 size 3674243072 extends beyond EOD, truncated [ 1025.802826][T11026] loop5: p236 size 3674243072 extends beyond EOD, truncated [ 1025.810846][T11026] loop5: p238 size 3674243072 extends beyond EOD, truncated [ 1025.820030][T11026] loop5: p240 size 3674243072 extends beyond EOD, truncated [ 1025.827982][T11026] loop5: p242 size 3674243072 extends beyond EOD, truncated [ 1025.836109][T11026] loop5: p244 size 3674243072 extends beyond EOD, truncated [ 1025.844156][T11026] loop5: p246 size 3674243072 extends beyond EOD, truncated [ 1025.852170][T11026] loop5: p248 size 3674243072 extends beyond EOD, truncated [ 1025.860094][T11026] loop5: p250 size 3674243072 extends beyond EOD, truncated 22:53:40 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000000ff0aac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:40 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x203000000000000, 0xffffffffffffffff, 0x0) 22:53:40 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:40 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f00180f05000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:40 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000007400024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:40 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa900080000000003f200024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 1025.868050][T11026] loop5: p252 size 3674243072 extends beyond EOD, truncated [ 1025.876137][T11026] loop5: p254 size 3674243072 extends beyond EOD, truncated 22:53:40 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x300000000000000, 0xffffffffffffffff, 0x0) [ 1025.936125][T11420] loop4: detected capacity change from 0 to 90881 [ 1025.938939][T11418] loop3: detected capacity change from 0 to 264192 [ 1025.943115][T11422] loop1: detected capacity change from 0 to 90881 [ 1025.962296][T11417] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 22:53:40 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1026.002006][T11418] loop3: p1 p3 p4 [ 1026.006726][T11418] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1026.017194][T11527] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1026.031685][T11420] loop4: p1 p3 p4 [ 1026.035526][T11420] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1026.042740][T11418] loop3: p4 size 3674243072 extends beyond EOD, truncated 22:53:40 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x400000000000000, 0xffffffffffffffff, 0x0) 22:53:40 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1026.051066][T11422] loop1: p1 p3 p4 [ 1026.053653][T11420] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1026.054873][T11422] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1026.082678][T11422] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1026.086064][T11418] loop3: detected capacity change from 0 to 264192 [ 1026.123822][T11631] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1026.126792][T11420] loop4: detected capacity change from 0 to 90881 [ 1026.152095][T11418] loop3: p1 p3 p4 [ 1026.156314][T11418] loop3: p1 size 11290111 extends beyond EOD, truncated 22:53:40 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x500000000000000, 0xffffffffffffffff, 0x0) 22:53:41 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1026.169615][T11422] loop1: detected capacity change from 0 to 90881 [ 1026.174629][T11418] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1026.189762][T11733] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1026.214482][T11422] loop1: p1 p3 p4 [ 1026.218327][T11420] loop4: p1 p3 p4 [ 1026.224005][T11420] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1026.233869][T11422] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1026.243132][T11420] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1026.251377][T11422] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1026.295207][T11838] loop5: detected capacity change from 0 to 69377 [ 1026.319368][ T1439] loop5: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1026.320068][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1026.591016][T11838] loop5: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1026.593605][T11838] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1027.009066][T11838] loop5: detected capacity change from 0 to 69377 [ 1027.038174][T11838] loop5: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1027.039945][T11838] loop5: p4 size 3674243072 extends beyond EOD, truncated 22:53:42 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000000ff10ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:42 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f00181005000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:42 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:42 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x600000000000000, 0xffffffffffffffff, 0x0) 22:53:42 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000007a00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:42 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa900080000fffffff600024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:42 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1027.242306][T11843] loop4: detected capacity change from 0 to 90881 [ 1027.246061][T11846] loop3: detected capacity change from 0 to 16129 [ 1027.249264][T11845] loop1: detected capacity change from 0 to 90881 [ 1027.257485][T11847] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 22:53:42 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x700000000000000, 0xffffffffffffffff, 0x0) [ 1027.306248][T11843] loop4: p1 p3 p4 [ 1027.310265][T11843] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1027.318881][T11846] loop3: p1 p3 p4 [ 1027.322705][T11845] loop1: p1 p3 p4 [ 1027.326596][T11845] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1027.340018][T11846] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1027.349428][T11953] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1027.350875][T11843] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1027.365628][T11845] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1027.369500][T11846] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1027.402037][ T1439] loop5: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1027.405629][ T1439] loop5: p4 size 3674243072 extends beyond EOD, [ 1027.410645][T11845] loop1: detected capacity change from 0 to 90881 22:53:42 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:42 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x800000000000000, 0xffffffffffffffff, 0x0) [ 1027.492713][ T1439] truncated 22:53:42 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa900080000000162f900024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 1027.529226][T11843] loop4: detected capacity change from 0 to 90881 [ 1027.537407][T12057] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1027.560126][T11846] loop3: detected capacity change from 0 to 16129 [ 1027.566751][T11843] loop4: p1 p3 p4 [ 1027.570673][T11843] loop4: p1 size 11290111 extends beyond EOD, truncated 22:53:42 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1027.582799][T11843] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1027.606832][T12157] loop1: detected capacity change from 0 to 90881 [ 1027.613216][T11846] loop3: p1 p3 p4 [ 1027.617121][T11846] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1027.619181][T12162] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1027.643052][T11846] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1027.672979][T12157] loop1: p1 p3 p4 [ 1027.676780][T12157] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1027.684969][T12157] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1027.755268][T12157] loop1: detected capacity change from 0 to 90881 [ 1027.811931][T12157] loop1: p1 p3 p4 [ 1027.815809][T12157] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1027.828229][T12157] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1027.927280][T12264] loop5: detected capacity change from 0 to 69377 [ 1027.977706][ T1439] loop5: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1027.978939][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1028.250389][T12264] loop5: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1028.251282][T12264] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1028.679300][T12264] loop5: detected capacity change from 0 to 69377 [ 1028.717678][ T1439] loop5: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1028.718828][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1028.995142][T12264] loop5: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1028.996091][T12264] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1029.180154][T12264] ================================================================== [ 1029.188400][T12264] BUG: KCSAN: data-race in delete_from_page_cache_batch / folio_mapping [ 1029.196705][T12264] [ 1029.199005][T12264] write to 0xffffea0005268318 of 8 bytes by task 1439 on cpu 0: [ 1029.206625][T12264] delete_from_page_cache_batch+0x35c/0x780 [ 1029.212497][T12264] truncate_inode_pages_range+0x1d5/0xa00 [ 1029.218197][T12264] truncate_inode_pages+0x20/0x30 [ 1029.223412][T12264] blkdev_flush_mapping+0xde/0x230 [ 1029.228603][T12264] blkdev_put+0x394/0x4a0 [ 1029.232920][T12264] blkdev_close+0x32/0x40 [ 1029.237253][T12264] __fput+0x295/0x520 [ 1029.241215][T12264] ____fput+0x11/0x20 [ 1029.245170][T12264] task_work_run+0x8e/0x110 [ 1029.249648][T12264] exit_to_user_mode_prepare+0x160/0x190 [ 1029.255259][T12264] syscall_exit_to_user_mode+0x20/0x40 [ 1029.260714][T12264] do_syscall_64+0x50/0xd0 [ 1029.265106][T12264] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1029.270975][T12264] [ 1029.273278][T12264] read to 0xffffea0005268318 of 8 bytes by task 12264 on cpu 1: [ 1029.280878][T12264] folio_mapping+0x92/0x120 [ 1029.285360][T12264] __pagevec_lru_add_fn+0x81/0x380 [ 1029.290445][T12264] __pagevec_lru_add+0x1c3/0x270 [ 1029.295362][T12264] lru_add_drain_cpu+0x6a/0x260 [ 1029.300189][T12264] lru_add_drain+0x21/0x60 [ 1029.304580][T12264] exit_mmap+0x218/0x470 [ 1029.308799][T12264] __mmput+0x27/0x1b0 [ 1029.312757][T12264] mmput+0x3d/0x50 [ 1029.316456][T12264] exit_mm+0xdb/0x170 [ 1029.320424][T12264] do_exit+0x608/0x17a0 [ 1029.324560][T12264] do_group_exit+0xce/0x180 [ 1029.329047][T12264] get_signal+0xfc3/0x1550 [ 1029.333455][T12264] arch_do_signal_or_restart+0x8c/0x2e0 [ 1029.338978][T12264] exit_to_user_mode_prepare+0x113/0x190 [ 1029.344604][T12264] syscall_exit_to_user_mode+0x20/0x40 [ 1029.350048][T12264] do_syscall_64+0x50/0xd0 [ 1029.354538][T12264] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1029.360419][T12264] [ 1029.362727][T12264] value changed: 0xffff88810056a5f8 -> 0x0000000000000000 [ 1029.369818][T12264] [ 1029.372119][T12264] Reported by Kernel Concurrency Sanitizer on: 22:53:44 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000000ff64ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:44 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000008900024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:44 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x900000000000000, 0xffffffffffffffff, 0x0) 22:53:44 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:44 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f00181105000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:44 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa900080000fffffffb00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) [ 1029.378241][T12264] CPU: 1 PID: 12264 Comm: syz-executor.5 Not tainted 5.16.0-rc3-syzkaller #0 [ 1029.386972][T12264] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1029.396998][T12264] ================================================================== [ 1029.418189][T12269] loop3: detected capacity change from 0 to 264192 22:53:44 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0xa00000000000000, 0xffffffffffffffff, 0x0) 22:53:44 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1029.419984][T12272] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1029.425360][T12271] loop1: detected capacity change from 0 to 90881 [ 1029.437644][T12273] loop4: detected capacity change from 0 to 90881 [ 1029.492371][T12379] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1029.505561][T12269] loop3: p1 p3 p4 [ 1029.505673][T12271] loop1: p1 p3 p4 [ 1029.509384][T12269] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1029.513122][T12273] loop4: p1 p3 p4 [ 1029.521891][T12269] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1029.527538][T12271] loop1: p1 size 11290111 extends beyond EOD, truncated 22:53:44 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x27000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:44 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0xb00000000000000, 0xffffffffffffffff, 0x0) [ 1029.547928][T12273] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1029.555342][T12271] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1029.571478][T12273] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1029.589363][T12269] loop3: detected capacity change from 0 to 264192 [ 1029.596180][T12482] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1029.635327][T12269] loop3: p1 p3 p4 [ 1029.639157][T12269] loop3: p1 size 11290111 extends beyond EOD, truncated 22:53:44 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:44 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0xc00000000000000, 0xffffffffffffffff, 0x0) [ 1029.658630][T12271] loop1: detected capacity change from 0 to 90881 [ 1029.670119][T12273] loop4: detected capacity change from 0 to 90881 [ 1029.670721][T12587] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1029.693158][T12269] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1029.731892][T12273] loop4: p1 p3 p4 [ 1029.735707][T12271] loop1: p1 p3 p4 [ 1029.739554][T12271] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1029.748360][T12273] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1029.757293][T12273] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1029.766325][T12271] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1029.814939][T12692] loop5: detected capacity change from 0 to 69377 [ 1029.868935][ T1439] loop5: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1029.869702][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1030.139212][T12692] loop5: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1030.140165][T12692] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1030.540863][T12692] loop5: detected capacity change from 0 to 69377 [ 1030.568378][T12692] loop5: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1030.569605][T12692] loop5: p4 size 3674243072 extends beyond EOD, truncated 22:53:45 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000000ff45ac0200ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:45 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0xd00000000000000, 0xffffffffffffffff, 0x0) 22:53:45 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f00181205000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:45 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:45 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa900080000000003fc00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:45 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa9000800000000009000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:45 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0xe00000000000000, 0xffffffffffffffff, 0x0) [ 1030.764960][T12699] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1030.766627][T12697] loop1: detected capacity change from 0 to 90881 [ 1030.777207][T12700] loop4: detected capacity change from 0 to 90881 [ 1030.787900][T12702] loop3: detected capacity change from 0 to 12033 22:53:45 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48020000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1030.823651][T12700] loop4: p1 p3 p4 [ 1030.831940][T12702] loop3: p1 p3 p4 [ 1030.832702][T12697] loop1: p1 p3 p4 [ 1030.835899][T12702] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1030.839857][T12697] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1030.851094][T12702] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1030.860715][T12700] loop4: p1 size 11290111 extends beyond EOD, truncated 22:53:45 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1030.863064][T12697] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1030.874921][T12807] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1030.888636][T12700] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1030.910528][T12702] loop3: detected capacity change from 0 to 12033 [ 1030.917424][T12697] loop1: detected capacity change from 0 to 90881 22:53:45 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x1000000000000000, 0xffffffffffffffff, 0x0) [ 1030.938343][T12910] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1030.957992][T12700] loop4: detected capacity change from 0 to 90881 [ 1030.963787][T12702] loop3: p1 p3 p4 [ 1030.965213][T12697] loop1: p1 p3 p4 [ 1030.969504][T12702] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1030.979840][T12697] loop1: p1 size 11290111 extends beyond EOD, truncated 22:53:45 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x1100000000000000, 0xffffffffffffffff, 0x0) 22:53:45 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1030.988827][T12702] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1030.997495][T12697] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1031.006446][T12700] loop4: p1 p3 p4 [ 1031.010712][T12700] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1031.032078][T13017] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1031.033568][T12700] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1031.063615][ T1439] loop5: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1031.067650][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1031.371066][T13120] loop5: detected capacity change from 0 to 69377 [ 1031.407685][ T1439] loop5: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1031.408519][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1031.666903][T13120] loop5: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1031.667981][T13120] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1032.087662][T13120] loop5: detected capacity change from 0 to 69377 [ 1032.136994][ T1439] loop5: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1032.137990][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1032.406377][T13120] loop5: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1032.407358][T13120] loop5: p4 size 3674243072 extends beyond EOD, truncated 22:53:47 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000000ff45ac0300ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:47 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x1200000000000000, 0xffffffffffffffff, 0x0) 22:53:47 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa900080000fffffdfd00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:47 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f00181c05000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:47 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x66030000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:47 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa900080000000000c000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:47 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x2200000000000000, 0xffffffffffffffff, 0x0) [ 1032.674970][T13128] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1032.675999][T13129] loop4: detected capacity change from 0 to 90881 [ 1032.687144][T13123] loop1: detected capacity change from 0 to 90881 [ 1032.700135][T13126] loop3: detected capacity change from 0 to 264192 22:53:47 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1032.742173][T13129] loop4: p1 p3 p4 [ 1032.749294][T13126] loop3: p1 p3 p4 [ 1032.753733][T13129] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1032.754093][T13123] loop1: p1 p3 p4 [ 1032.765270][T13126] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1032.772171][T13129] loop4: p4 size 3674243072 extends beyond EOD, truncated 22:53:47 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x2300000000000000, 0xffffffffffffffff, 0x0) [ 1032.783909][T13235] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1032.797573][T13123] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1032.798357][T13126] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1032.829701][T13123] loop1: p4 size 3674243072 extends beyond EOD, truncated 22:53:47 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1032.843330][T13129] loop4: detected capacity change from 0 to 90881 [ 1032.870258][T13126] loop3: detected capacity change from 0 to 264192 [ 1032.882095][T13129] loop4: p1 p3 p4 22:53:47 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x2700000000000000, 0xffffffffffffffff, 0x0) [ 1032.885954][T13339] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1032.891335][T13129] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1032.916940][T13123] loop1: detected capacity change from 0 to 90881 [ 1032.921973][T13126] loop3: p1 p3 p4 [ 1032.927242][T13126] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1032.936866][T13129] loop4: p4 size 3674243072 extends beyond EOD, truncated 22:53:47 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1032.948568][T13126] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1032.962446][T13123] loop1: p1 p3 p4 [ 1032.966502][T13123] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1032.979429][T13123] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1033.002046][T13445] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1033.048373][T13547] loop5: detected capacity change from 0 to 69377 [ 1033.078265][ T1439] loop5: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1033.079364][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1033.343997][T13547] loop5: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1033.345099][T13547] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1033.762021][T13547] loop5: detected capacity change from 0 to 69377 [ 1033.797967][ T1439] loop5: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1033.798807][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1034.065306][T13547] loop5: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1034.066151][T13547] loop5: p4 size 3674243072 extends beyond EOD, truncated 22:53:49 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000000ff45ac0400ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:49 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa900080000000000ec00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:49 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x3f00000000000000, 0xffffffffffffffff, 0x0) 22:53:49 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f00182505000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:49 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa900080000fffffffd00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:49 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1034.303184][T13553] loop3: detected capacity change from 0 to 237313 [ 1034.305920][T13555] loop1: detected capacity change from 0 to 90881 [ 1034.311855][T13556] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1034.328721][T13557] loop4: detected capacity change from 0 to 90881 [ 1034.332332][T13555] loop1: p1 p3 p4 [ 1034.336854][T13553] loop3: p1 p3 p4 [ 1034.339559][T13555] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1034.350595][T13553] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1034.362016][T13555] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1034.375205][T13553] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1034.391991][T13557] loop4: p1 p3 p4 [ 1034.395982][T13557] loop4: p1 size 11290111 extends beyond EOD, truncated 22:53:49 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x4000000000000000, 0xffffffffffffffff, 0x0) 22:53:49 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8cffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1034.415195][T13555] loop1: detected capacity change from 0 to 90881 [ 1034.423651][T13557] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1034.448150][T13660] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1034.460221][T13555] loop1: p1 p3 p4 22:53:49 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x4800000000000000, 0xffffffffffffffff, 0x0) [ 1034.467120][T13553] loop3: detected capacity change from 0 to 237313 [ 1034.473870][T13555] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1034.486981][T13557] loop4: detected capacity change from 0 to 90881 [ 1034.494498][T13555] loop1: p4 size 3674243072 extends beyond EOD, truncated 22:53:49 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa900080000fffffffe00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:49 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xab000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1034.521810][T13553] loop3: p1 p3 p4 [ 1034.525712][T13553] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1034.535432][T13557] loop4: p1 p3 p4 [ 1034.543075][T13557] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1034.560376][T13553] loop3: p4 size 3674243072 extends beyond EOD, truncated 22:53:49 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x4802000000000000, 0xffffffffffffffff, 0x0) [ 1034.568351][T13766] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1034.580108][T13557] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1034.588282][T13768] loop1: detected capacity change from 0 to 90881 [ 1034.624130][T13768] loop1: p1 p3 p4 [ 1034.629273][T13768] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1034.646080][T13871] loop5: detected capacity change from 0 to 69377 [ 1034.646711][T13768] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1034.697544][ T1439] loop5: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1034.698847][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1034.795910][T13768] loop1: detected capacity change from 0 to 90881 [ 1034.851730][T13768] loop1: p1 p3 p4 [ 1034.855784][T13768] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1034.864330][T13768] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1034.983519][T13871] loop5: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1034.984698][T13871] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1035.391128][T13871] loop5: detected capacity change from 0 to 69377 [ 1035.416992][ T1906] udevd[1906]: inotify_add_watch(7, /dev/loop4p1, 10) failed: No such file or directory [ 1035.432507][ T1439] loop5: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1035.433489][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1035.688022][T13871] loop5: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1035.689018][T13871] loop5: p4 size 3674243072 extends beyond EOD, truncated 22:53:50 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000000ff45ac0500ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:50 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f00182605000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:50 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa900080000000000ee00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:50 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb6010000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:50 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x4c00000000000000, 0xffffffffffffffff, 0x0) 22:53:50 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa900080000000003ff00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:50 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x50ae1d0000000000, 0xffffffffffffffff, 0x0) 22:53:50 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf6ffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1035.891684][T13880] loop4: detected capacity change from 0 to 90881 [ 1035.895250][T13882] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1035.898603][T13881] loop1: detected capacity change from 0 to 90881 [ 1035.917583][T13883] loop3: detected capacity change from 0 to 264192 [ 1035.973435][T13880] loop4: p1 p3 p4 [ 1035.977236][T13881] loop1: p1 p3 p4 [ 1035.980980][T13883] loop3: p1 p3 p4 [ 1035.989560][T13880] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1035.997982][T13881] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1036.003002][T13883] loop3: p1 size 11290111 extends beyond EOD, truncated 22:53:50 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x5200000000000000, 0xffffffffffffffff, 0x0) [ 1036.012392][T13987] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1036.021871][T13883] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1036.031484][T13880] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1036.038872][T13881] loop1: p4 size 3674243072 extends beyond EOD, truncated 22:53:50 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x6800000000000000, 0xffffffffffffffff, 0x0) 22:53:50 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1036.066655][T13883] loop3: detected capacity change from 0 to 264192 [ 1036.079369][T13880] loop4: detected capacity change from 0 to 90881 [ 1036.080121][T13881] loop1: detected capacity change from 0 to 90881 [ 1036.122469][T13883] loop3: p1 p3 p4 [ 1036.126330][T13881] loop1: p1 p3 p4 [ 1036.130297][T13880] loop4: p1 p3 p4 [ 1036.134399][T13881] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1036.141496][T13883] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1036.149763][T13880] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1036.157711][T14094] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 22:53:51 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x6c00000000000000, 0xffffffffffffffff, 0x0) [ 1036.158899][T13883] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1036.177698][T13881] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1036.192298][T13880] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1036.263358][T14198] loop5: detected capacity change from 0 to 69377 [ 1036.318685][ T1439] loop5: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1036.319682][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1036.580597][T14198] loop5: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1036.581435][T14198] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1036.995253][T14198] loop5: detected capacity change from 0 to 69377 [ 1037.058391][ T1439] loop5: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1037.059356][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1037.329118][T14198] loop5: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1037.330032][T14198] loop5: p4 size 3674243072 extends beyond EOD, truncated 22:53:52 executing program 5: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f0018000a000000ff45ac0600ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:52 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff8000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:52 executing program 1: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa90008000000000fff00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:52 executing program 4: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="0201630018000a000000ff45ac0000ffffffa900080000000000fe00024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:52 executing program 3: syz_read_part_table(0x0, 0x1a, &(0x7f0000000000)=[{&(0x7f0000000040)="02010f00182e05000000ff45ac0000ffffffa9000800000000000000024000fffffffd000000e1000000887700720030070082ffffff00000000008000db55aa", 0x40, 0x1c0}]) 22:53:52 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x6f01000000000000, 0xffffffffffffffff, 0x0) 22:53:52 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x7400000000000000, 0xffffffffffffffff, 0x0) [ 1037.583469][T14204] loop4: detected capacity change from 0 to 90881 [ 1037.585834][T14206] loop3: detected capacity change from 0 to 264192 [ 1037.596885][T14201] loop1: detected capacity change from 0 to 90881 [ 1037.610984][T14208] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 22:53:52 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 22:53:52 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x7a00000000000000, 0xffffffffffffffff, 0x0) [ 1037.641826][T14204] loop4: p1 p3 p4 [ 1037.645955][T14204] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1037.667818][T14204] loop4: p4 size 3674243072 extends beyond EOD, truncated [ 1037.675693][T14201] loop1: p1 p3 p4 [ 1037.679494][T14206] loop3: p1 p3 p4 [ 1037.685782][T14201] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1037.693078][T14206] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1037.702959][T14316] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1037.714938][T14206] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1037.722277][T14201] loop1: p4 size 3674243072 extends beyond EOD, truncated 22:53:52 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x8cffffff00000000, 0xffffffffffffffff, 0x0) 22:53:52 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x3, &(0x7f0000000100)=0x1, 0x400) perf_event_open(&(0x7f0000000140)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xab00b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff8c}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1037.745969][T14204] loop4: detected capacity change from 0 to 90881 [ 1037.778659][T14206] loop3: detected capacity change from 0 to 264192 [ 1037.781794][T14204] loop4: p1 p3 p4 [ 1037.786160][T14201] loop1: detected capacity change from 0 to 90881 [ 1037.789355][T14204] loop4: p1 size 11290111 extends beyond EOD, truncated [ 1037.808032][T14421] ref_ctr_offset mismatch. inode: 0x46f offset: 0xab00b ref_ctr_offset(old): 0x5c00 ref_ctr_offset(new): 0x4 [ 1037.820197][T14206] loop3: p1 p3 p4 [ 1037.824000][T14201] loop1: p1 p3 p4 [ 1037.828354][T14201] loop1: p1 size 11290111 extends beyond EOD, truncated [ 1037.828556][T14204] loop4: p4 size 3674243072 extends beyond EOD, truncated 22:53:52 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) set_mempolicy(0x1, &(0x7f00000000c0)=0x3, 0x9) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4}, 0xffffffffffffffff, 0x9e01000000000000, 0xffffffffffffffff, 0x0) [ 1037.835885][T14206] loop3: p1 size 11290111 extends beyond EOD, truncated [ 1037.850887][T14201] loop1: p4 size 3674243072 extends beyond EOD, truncated [ 1037.859808][T14206] loop3: p4 size 3674243072 extends beyond EOD, truncated [ 1037.960959][ T2932] udevd[2932]: inotify_add_watch(7, /dev/loop1p1, 10) failed: No such file or directory [ 1037.961034][ T2931] udevd[2931]: inotify_add_watch(7, /dev/loop1p4, 10) failed: No such file or directory [ 1037.972749][ T1906] udevd[1906]: inotify_add_watch(7, /dev/loop1p3, 10) failed: No such file or directory [ 1038.011379][T14527] loop5: detected capacity change from 0 to 69377 [ 1038.037190][ T1439] loop5: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1038.038114][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1038.306215][T14527] loop5: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1038.307171][T14527] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1038.732462][T14527] loop5: detected capacity change from 0 to 69377 [ 1038.767595][ T1439] loop5: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1038.768583][ T1439] loop5: p4 size 3674243072 extends beyond EOD, truncated [ 1039.029532][T14527] loop5: p1 < p5 p6 p7 p8 p9 p10 p11 p12 p13 p14 p15 p16 p17 p18 p19 p20 p21 p22 p23 p24 p25 p26 p27 p28 p29 p30 p31 p32 p33 p34 p35 p36 p37 p38 p39 p40 p41 p42 p43 p44 p45 p46 p47 p48 p49 p50 p51 p52 p53 p54 p55 p56 p57 p58 p59 p60 p61 p62 p63 p64 p65 p66 p67 p68 p69 p70 p71 p72 p73 p74 p75 p76 p77 p78 p79 p80 p81 p82 p83 p84 p85 p86 p87 p88 p89 p90 p91 p92 p93 p94 p95 p96 p97 p98 p99 p100 p101 p102 p103 p104 p105 p106 p107 p108 p109 p110 p111 p112 p113 p114 p115 p116 p117 p118 p119 p120 p121 p122 p123 p124 p125 p126 p127 p128 p129 p130 p131 p132 p133 p134 p135 p136 p137 p138 p139 p140 p141 p142 p143 p144 p145 p146 p147 p148 p149 p150 p151 p152 p153 p154 p155 p156 p157 p158 p159 p160 p161 p162 p163 p164 p165 p166 p167 p168 p169 p170 p171 p172 p173 p174 p175 p176 p177 p178 p179 p180 p181 p182 p183 p184 p185 p186 p187 p188 p189 p190 p191 p192 p193 p194 p195 p196 p197 p198 p199 p200 p201 p202 p203 p204 p205 p206 p207 p208 p209 p210 p211 p212 p213 p214 p215 p216 [ 1039.030783][T14527] loop5: p4 size 3674243072 extends beyond EOD, truncated